CN109564604A - Fingerprint verification method, device, equipment and storage medium - Google Patents

Fingerprint verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN109564604A
CN109564604A CN201880002045.9A CN201880002045A CN109564604A CN 109564604 A CN109564604 A CN 109564604A CN 201880002045 A CN201880002045 A CN 201880002045A CN 109564604 A CN109564604 A CN 109564604A
Authority
CN
China
Prior art keywords
user
finger print
print information
target key
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880002045.9A
Other languages
Chinese (zh)
Inventor
曹岚健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Goodix Technology Co Ltd
Goodix Technology Hong Kong Co Ltd
Original Assignee
Shenzhen Huiding Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huiding Technology Co Ltd filed Critical Shenzhen Huiding Technology Co Ltd
Publication of CN109564604A publication Critical patent/CN109564604A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Abstract

The present invention provides a kind of fingerprint verification method, device, equipment and storage medium, comprising: obtains user fingerprints information by target key, and authenticates to the finger print information got;If authenticating successfully to finger print information, and the first user's operation to target key is got, does not then trigger the business conduct after finger print information authenticates successfully, improve the safety and reliability of terminal.

Description

Fingerprint verification method, device, equipment and storage medium
Technical field
This application involves finger print identifying technical fields more particularly to a kind of fingerprint verification method, device, equipment and storage to be situated between Matter.
Background technique
With the fast development of information technology, terminal (such as mobile phone, tablet computer) using more more and more universal.As Standard configuration technology in terminal, fingerprint identification technology are used widely in the functions such as the unlock, wake-up, mobile payment of terminal. Especially fingerprint payment function can not only overcome numerical ciphers in the prior art and be easy the drawbacks of being stolen, but also input more It is quick.
In the prior art, authentication is carried out by fingerprint recognition, usually touches or press by finger and is adopted in fingerprint Collect module, triggering fingerprint authentication module carries out finger print identifying, if fingerprint authentication module authenticates successfully, after triggering authentication success Business conduct.
However, in the prior art, since in fingerprint identification process, finger print identifying is successfully the business after triggering authentication success Behavior can not judge certain malicious virus webpage of its safety for user, be easy because it is personal be not intended to or guided by force or It misleads and carries out fingerprint authentication, cause unnecessary personal safety information leakage or property loss, the safety of terminal is lower.
Summary of the invention
To overcome relevant issues existing in the prior art, the application provide a kind of fingerprint verification method, device, equipment and Storage medium.
In a first aspect, the application provides a kind of fingerprint verification method, comprising:
User fingerprints information is obtained by target key, and the finger print information got is authenticated;If believing fingerprint Breath authenticates successfully, and gets the first user's operation to target key, then does not trigger the industry after finger print information authenticates successfully Business behavior.
Due in the embodiment of the present application, by after finger print information authenticates successfully, getting the first user's operation, then not Triggering finger print information authenticate successfully after business conduct, effectively avoid since maloperation causes to violate the industry of user intention Business behavior, and then improve the safety and reliability of terminal.
Optionally, the first user's operation is pushing operation of the user to target key.
Since in the embodiment of the present application, the first user's operation is pushing operation of the user to target key, the first user behaviour It is simple, convenient to make, and by the first user's operation, after finger print identifying success, user executes pushing operation to target key, i.e., The business conduct after finger print information authenticates successfully can not be triggered, the operability of terminal is improved.
Optionally, if authenticating successfully to finger print information, and the second user operation to target key is got, then triggering refers to Business conduct after the success of line authentification of message.
Due to after being authenticated successfully to finger print information, getting and using the second of target key in the embodiment of the present application Family operation, then trigger the business conduct after finger print information authenticates successfully, further determines that triggering refers to by second user operation Business conduct after the success of line authentification of message, improves the reliability of terminal.
Optionally, second user operation is the operation that user removes finger from target key.
Since in the embodiment of the present application, second user operation is the operation that user removes finger from target key, second is used Family is easy to operate, convenient, and is operated by second user, after finger print identifying success, removes hand from target key by user Refer to operation, then triggers the business conduct after finger print information authenticates successfully, improve the operability and reliability of terminal.
Optionally, user fingerprints information is obtained by target key, and the finger print information got is authenticated, wrapped It includes:
Obtain legal user fingerprints template;User fingerprints information and user fingerprints template are matched.
Optionally, fingerprint verification method provided by the embodiments of the present application further include:
If authenticating successfully to finger print information, and the first user's operation to target key is got, then pushes prompt information, To prompt user that can not carry out business conduct.
Optionally, business conduct is user's payment behavior.
Optionally, target key is any one of Home key, return key or acknowledgement key.
Device, equipment, storage medium and computer program product is explained below, effect can refer to the effect of method part Fruit below repeats no more this.
Second aspect, the application provide a kind of fingerprint certification device, comprising:
Module is obtained, for obtaining user fingerprints information, authentication module, for the fingerprint got by target key Information is authenticated;First processing module, if for being authenticated successfully to finger print information, and get and use the first of target key Family operation, then do not trigger the business conduct after finger print information authenticates successfully.
Optionally, the first user's operation is pushing operation of the user to target key.
Optionally, fingerprint certification device provided by the present application further include:
Second processing module, if for being authenticated successfully to finger print information, and get the second user behaviour to target key Make, then triggers the business conduct after finger print information authenticates successfully.
Optionally, second user operation is the operation that user removes finger from target key.
Optionally, authentication module is specifically used for:
Obtain legal user fingerprints template;User fingerprints information and user fingerprints template are matched.
Optionally, fingerprint certification device provided in an embodiment of the present invention, further includes:
Pushing module, if for being authenticated successfully to finger print information, and get the first user's operation to target key, then Prompt information is pushed, to prompt user that can not carry out business conduct.
Optionally, business conduct is user's payment behavior.
Optionally, target key is any one of Home key, return key or acknowledgement key.
The third aspect, the application provide a kind of fingerprint recognition mould group, comprising: target key and micro-control unit MCU;
MCU is used for: being obtained user fingerprints information by target key, is authenticated to finger print information, and by authentication result It is sent to processor;If getting the first user's operation by target key, the first user's operation is sent to processor, with When authenticating processor successfully to finger print information according to authentication result is determining, finger print information is not triggered according to the first user's operation and is recognized Business conduct after demonstrate,proving successfully.
Optionally, the first user's operation is pushing operation of the user to target key.
Optionally, MCU is also used to:
If getting second user operation by target key, second user operation is sent to processor, so that place When reason device authenticates successfully to finger print information according to authentication result is determining, triggering finger print information is operated according to second user and is authenticated successfully Business conduct later.
Optionally, second user operation is the operation that user removes finger from target key.
Optionally, MCU is specifically used for:
Obtain legal user fingerprints template;User fingerprints information and user fingerprints template are matched.
Optionally, MCU is also used to:
If authenticating successfully to finger print information, and the first user's operation to target key is got, then pushes prompt information, To prompt user that can not carry out business conduct.
Optionally, business conduct is user's payment behavior.
Optionally, target key is any one of Home key, return key or acknowledgement key.
Fourth aspect, the application provide a kind of terminal device, and terminal device includes: fingerprint recognition mould group and processor, institute Stating fingerprint recognition mould group includes: target key and micro-control unit MCU;
MCU is used for: user fingerprints information obtained by target key, and the finger print information got is authenticated, to Processor sends authentication result;If getting the first user's operation by target key, the first user's operation is sent to place Manage device.
Processor is used for: if being authenticated successfully according to authentication result determination to finger print information, not according to the first user's operation Trigger the business conduct after finger print information authenticates successfully.
Optionally, the first user's operation is pushing operation of the user to target key.
Optionally, second user is operated and is sent out if being also used to get second user operation by target key by MCU Give processor.
If processor operates be also used to authenticate successfully to finger print information according to authentication result is determining according to second user Trigger the business conduct after finger print information authenticates successfully.
Optionally, second user operation is the operation that user removes finger from target key.
Optionally, MCU is specifically used for:
Obtain legal user fingerprints template;User fingerprints information and user fingerprints template are matched.
Optionally, MCU is also used to:
If authenticating successfully to finger print information, and the first user's operation to target key is got, then pushes prompt information, To prompt user that can not carry out business conduct.
Optionally, business conduct is user's payment behavior.
Optionally, target key is any one of Home key, return key or acknowledgement key.
5th aspect, the application provide a kind of computer storage medium, and storage medium includes computer instruction, when instruction quilt When computer executes, so that computer realizes the fingerprint verification method of first aspect or first aspect optional way.
6th aspect, the application provide a kind of computer program product, including computer instruction, when instruction is held by computer When row, so that computer realizes the fingerprint verification method of first aspect or first aspect optional way.
The application provides a kind of fingerprint verification method, device, equipment and storage medium, comprising: is obtained by target key User fingerprints information, and the finger print information got is authenticated;If being authenticated successfully to finger print information, and get to target First user's operation of key does not trigger the business conduct after finger print information authenticates successfully then.Due in the embodiment of the present application, After finger print information authenticates successfully, by getting the first user's operation, then do not trigger after finger print information authenticates successfully Business conduct effectively avoids since maloperation causes to violate the business conduct of user intention, and then improves the peace of terminal Full property and reliability.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with It obtains other drawings based on these drawings.
Fig. 1 is the flow diagram for the fingerprint verification method that one embodiment of the application provides;
Fig. 2 is the operation interface schematic diagram that one embodiment of the application provides;
Fig. 3 is the flow diagram for the fingerprint verification method that another embodiment of the application provides;
Fig. 4 is the operation interface schematic diagram that another embodiment of the application provides;
Fig. 5 is the schematic diagram for the fingerprint certification device that one embodiment of the application provides;
Fig. 6 is the structural schematic diagram for the fingerprint recognition mould group that one embodiment of the application provides;
Fig. 7 is the structural schematic diagram for the terminal device that one embodiment of the application provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so as to embodiments herein described herein, such as can be with Sequence other than those of illustrating or describing herein is implemented.In addition, term " includes " and " having " and their times What is deformed, it is intended that cover it is non-exclusive include, for example, contain the process, method of a series of steps or units, system, Product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for The intrinsic other step or units of these process, methods, product or equipment.
With the fast development of information technology, terminal (such as mobile phone, tablet computer) using more more and more universal.As Standard configuration technology in terminal, fingerprint identification technology are used widely in the functions such as the unlock, wake-up, mobile payment of terminal. Especially fingerprint payment function can not only solve the problems, such as that numerical ciphers are easy to be stolen in the prior art, but also input more Fast.Since in fingerprint identification process, finger print identifying is successfully the business conduct after triggering authentication success, can not sentence for user Break certain malicious virus webpage of its safety, is easy to be not intended to because personal or guided by force, mislead and carry out fingerprint authentication, cause Unnecessary personal safety information leakage or property loss, the safety of terminal are lower.In order to solve these technical problems, this Shen Please embodiment a kind of fingerprint verification method, device, equipment and storage medium are provided.
Before introducing the embodiment of the present application, first the implement scene of the embodiment of the present application is simply introduced below:
Scene case one:
Terminal shows certain malicious virus webpage, and the foreground program of webpage is a payment page, etc. to be verified at this time User fingerprints.Other display formats but the payment page is disguised oneself as, it is a payment page that user, which can not be aware of this page, Face, and the page does not provide exit button.The habit sexual behaviour of user at this time is to press home key to exit the page, but work as When user clicks home key using registered fingerprint finger, finger print information is authenticated successfully, and then triggers the branch after finger print identifying success The behavior of paying, causes user's unnecessary loss of property.
Sample Scenario two:
Terminal shows certain malicious virus webpage, and the foreground program of webpage is a payment page, and without exit button, just Waiting user fingerprints to be verified.The page does not disguise oneself as other forms, and user exits this by pressing Home key under desperation The page, but when user using registered fingerprint finger click Home key when, finger print information is proved to be successful, so trigger finger print identifying at Payment behavior after function causes user's unnecessary loss of property.
In above-mentioned example application scenarios or under other similar application scenarios, for example, other need user fingerprints to authenticate, And then the scenes such as initiation user's personal information leakage, due to being the paying bank after triggering finger print identifying is successful after finger print identifying success To have in turn resulted in the unnecessary loss of user, to solve the above-mentioned problems, the application provides a kind of fingerprint verification method, dress It sets, equipment and storage medium.
Based on above-mentioned application scenarios, below with specifically embodiment to the technical solution of the application and the technology of the application How scheme, which solves above-mentioned technical problem, is described in detail.These specific embodiments can be combined with each other below, for The same or similar concept or process may repeat no more in certain embodiments.Below in conjunction with attached drawing, to the reality of the application Example is applied to be described.
Embodiment one
Fig. 1 is the flow diagram for the fingerprint verification method that one embodiment of the application provides, as shown in Figure 1, the present embodiment It is applied to terminal in this way to come for example, the terminal can be mobile phone, digital broadcasting terminal, messaging device, Game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc., this method comprises the following steps:
Step S11: user fingerprints information is obtained by target key, and the finger print information got is authenticated.
Step S12: if authenticating successfully to finger print information, and the first user's operation to target key is got, then do not touched Business conduct after line authentification of message of bristling with anger success.
It is illustrated for step S11:
By target key obtain user fingerprints information during, target key can be Home key, return key and The physical buttons such as acknowledgement key, meanwhile, target key is also possible to virtual key, such as suspension ball etc., and the embodiment of the present application is to mesh The specific key and key form for marking key do not do any restrictions, as long as the fingerprint of user can be got by target key Information.Optionally, target key is any one of Home key, return key or acknowledgement key.
Relevant operation by user to target key obtains user fingerprints information, wherein phase of the user to target key Closing operation can be touch operation of the user to target key, and user fingerprints information is fed back to terminal by relevant operation by user Micro-control unit in equipment, terminal carry out identification and authentication to user fingerprints information.Fingerprint recognition refers to by comparing different The details of fingerprint are identified, and fingerprint identification technology is related to image procossing, pattern-recognition, computer vision, mathematics Numerous subjects such as morphology, wavelet analysis.Since everyone fingerprint is different, and between ten fingers of same people, fingerprint also has bright Aobvious difference, therefore fingerprint can be used for identity authentication.The embodiment of the present application does not do any restrictions to the concrete mode of fingerprint recognition, only It can be realized and user fingerprints information is identified.
In a kind of possible embodiment, user fingerprints information is obtained by target key, and to the fingerprint got Information is authenticated, comprising: obtains legal user fingerprints template;To user fingerprints information and for fingerprint template progress Match.
User is before carrying out finger print identifying, it is also necessary to obtain legal user fingerprints template, obtain legal user and refer to Line template can touch the target key acquisition that can acquire user fingerprints template by user fingerprints in the terminal, for example, user It can be by repeatedly being touched using right hand index finger to target key, being referred to by repeatedly inputting user in the setting of terminal Line information registers user preset finger print information, to obtain legal user fingerprints template.The embodiment of the present application is to obtaining The concrete mode of family fingerprint template is taken with no restrictions, in addition, finger of the embodiment of the present application to the user fingerprints template of acquisition And the user fingerprints template number obtained is also with no restrictions, obtains legal user fingerprints template as long as can be realized.
Relevant operation by user to target key, obtain user fingerprints information after, it is also necessary to the finger got Line information is authenticated, specifically, can be by matching to user fingerprints information and user fingerprints template, due to finger end Rectifying on surface skin has scraggly lines, contains a large amount of information.The lines of these skins is on pattern, breakpoint and intersection point Be it is different, they are referred to as " feature " in information processing, and these features have uniqueness and permanent, can be with Someone and its fingerprint are corresponded.By being matched to user fingerprints information and user fingerprints template, and can be with Authentication result is judged according to the similarity of user fingerprints information and user fingerprints template, if user fingerprints information and user fingerprints mould Plate successful match, then authenticate successfully user fingerprints information, if user fingerprints information and the failure of user fingerprints template matching, right User fingerprints information authentification failure.The embodiment of the present application does not do any restrictions to finger print information authentication mode, as long as can be realized The user fingerprints information got is authenticated.
Central processing unit (the Central Processing of terminal device can be passed through to user fingerprints information certification Unit, CPU) realize, can also by micro-control unit (Microcontroller Unit, MCU) Lai Shixian of terminal device, The specific implementation that the embodiment of the present application authenticates user fingerprints information is with no restrictions.
Step S12 is illustrated:
Certification by step S11 to the user fingerprints information got, can to the authentication result of user fingerprints information Think and user fingerprints information is authenticated successfully or to user fingerprints information authentification failure, is lost if being authenticated to user fingerprints information It loses, then will not trigger the business conduct after finger print identifying success, if desired continue to execute the business after finger print identifying success Behavior is then needed to reacquire user fingerprints information and be authenticated to the finger print information got, and the embodiment of the present application is to certification Terminal behavior after failure does not do any restrictions.
If authenticating successfully to finger print information, need to obtain the first user's operation to target key, to finger print information In the case where authenticating successfully and getting the first user's operation to target key, do not trigger after finger print information authenticates successfully Business conduct is further limited by the condition of the business conduct after authenticating successfully to triggering finger print information, can be effective The follow-up business behavior due to initiations such as user misoperations is avoided, the operability and safety of terminal are improved.For example, In above-mentioned example scene, in certain malicious virus webpage, the foreground program of webpage is a payment page, and the payment page is normal branch Page format or other display formats that disguised oneself as are paid, user fingerprints information certification is waited, if since user uses registered fingerprint Finger, which touches or click home key, causes finger print information to authenticate successfully, then user can not also be triggered by the first user's operation Finger print information authenticate successfully after payment behavior, so as to avoid user's unnecessary loss of property.Wherein, it obtains to target First user's operation of key can be realized by the MCU in terminal device.
In order not to trigger the business conduct after finger print information authenticates successfully, in a kind of possible embodiment, if right Finger print information authenticates successfully, and gets the first user's operation to target key, then pushes prompt information, with prompt user without Method carries out business conduct.Optionally, business conduct is user's payment behavior.It is to prompt user that can not carry out payment behavior below Example, is introduced the embodiment of the present invention, and Fig. 2 is the operation interface schematic diagram that one embodiment of the application provides, as shown in Fig. 2, It in payment process, needs to obtain user fingerprints information, wherein interface 201 indicates to obtain user fingerprints letter by target key Breath, and the finger print information got is authenticated successfully, it, can be to target key if user wants to prevent the payment behavior of this time Execute the first user's operation, wherein interface 202 indicates to get the first user's operation to target key, terminal push prompt Message 212 prompts user to prevent current payment behavior.
If authenticating successfully to finger print information, but the first user's operation is not got, then triggers finger print information and authenticate successfully Business conduct later, for example, in the case where the payment of normal Alipay needs finger print identifying, by obtaining user fingerprints letter Breath, and finger print information is authenticated successfully, and do not get the first user's operation, then Alipay successful payment, does not influence to touch Send out the business conduct after finger print information under normal circumstances authenticates successfully.
First user's operation can be the touch operation to target key more than preset duration, can be to target key Long press operation etc., the embodiment of the present application are not particularly limited the first user's operation, if can to finger print identifying success and The first user's operation is got, the business conduct after finger print information certification routine can not be triggered.Optionally, it first uses Family operation is the pushing operation to target key.After authenticating successfully to finger print information, user presses behaviour to the execution of target key Make, does not then trigger the business conduct after finger print information authenticates successfully.Such as: in examples detailed above scene, certain malicious virus net Page, the foreground program of webpage are a payment page, and the payment page is normal payment page format or other displays that disguised oneself as Form waits user fingerprints information certification, although leading to finger print information since user touches home key using registered fingerprint finger It authenticates successfully, but user can also prevent terminal from triggering after finger print information authenticates successfully by pressing the operation of home key Payment behavior, so as to avoid user's unnecessary loss of property.
In a kind of possible embodiment, after being authenticated successfully to finger print information, in order to prevent triggering finger print identifying Business conduct after success, it is more than preset duration that the first user's operation, which can also be that registered fingerprint finger touches target key,. For example, it is more than when presetting that registered fingerprint finger, which touches target key, after authenticating successfully to the user fingerprints information got It is long, then the business conduct after finger print identifying success is not triggered.
In the embodiment of the present application, since the embodiment of the present application can be by obtaining after finger print information authenticates successfully To the first user's operation, then do not trigger the business conduct after finger print information authenticates successfully, realize to finger print information certification at After function whether the corresponding business conduct of triggering carries out manual control, effectively avoid since maloperation etc. causes to violate use The business conduct of family wish, and then improve the safety and reliability of terminal.
Embodiment two
On the basis of the above embodiment 1, Fig. 3 is the process for the fingerprint verification method that another embodiment of the application provides Schematic diagram, the present embodiment is applied to terminal in this way to be come for example, the terminal can be mobile phone, and digital broadcasting is whole End, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc., such as Fig. 3 institute Show, fingerprint verification method provided by the present application further include:
Step S21: if authenticating successfully to finger print information, and the second user operation to target key is got, then triggered Finger print information authenticate successfully after business conduct.
Certification by step S11 to the user fingerprints information got needs to obtain if authenticating successfully finger print information The second user operation to target key is taken, in the case where being authenticated successfully to finger print information and getting second user operation, The business conduct after finger print information authenticates successfully is triggered, the business conduct after authenticating successfully to triggering finger print information is passed through Condition further limits, and can effectively avoid the follow-up business behavior due to initiations such as user misoperations, improve terminal Operability and safety.For example, in the case where the payment of normal Alipay needs finger print identifying, by obtaining user fingerprints Information, and finger print information is authenticated successfully, and get the second user operation to target key, then Alipay payment at Function does not influence to trigger the business conduct after finger print information under normal circumstances authenticates successfully.Fig. 4 is that another embodiment of the application mentions The operation interface schematic diagram of confession, as shown in figure 4, for example, needing to obtain in the case where the payment of normal Alipay needs finger print identifying User fingerprints information is taken, and finger print information is authenticated, interface 401 indicates to obtain user fingerprints information by target key, And the finger print information got is authenticated successfully, in the case where normal payment, user executes second user operation to terminal, uses Family interface 402 indicates after authenticating successfully to finger print information, gets the second user operation to target key, then triggering refers to Payment behavior after the success of line authentification of message.It, can be with after the business conduct after triggering finger print information authenticates successfully By PUSH message 412, user is prompted to pay successfully.
Second user operation can be the touch operation to target key, can be the pushing operation etc. to target key, The embodiment of the present application is not particularly limited second user operation, as long as can succeed to finger print identifying and get the second use Family operation can trigger the business conduct after finger print information certification routine.Optionally, second user operation be user from Target key removes the operation of finger.For example, in the case where the payment of normal Alipay needs finger print identifying, by obtaining user Finger print information, and finger print information being authenticated successfully, and user removes finger from target key, then Alipay successful payment, no Influence the business conduct after the finger print information of triggering under normal circumstances authenticates successfully.It obtains and the second user of target key is operated It can be realized by the MCU in terminal device.
The embodiment of the present application is not particularly limited the first user's operation and second user operation, as long as terminal being capable of basis First user's operation or second user operation progress do not trigger or trigger accordingly the business conduct after finger print identifying success i.e. It can.
In the embodiment of the present application, since the embodiment of the present application can be by obtaining after finger print information authenticates successfully It is operated to second user, then triggers the business conduct after finger print information authenticates successfully, effectively avoid due to maloperation etc. It causes to violate the business conduct of user intention, and then improves the safety and reliability of terminal.
Embodiment three
The embodiment of the present application also provides a kind of fingerprint certification device, and Fig. 5 is the finger print identifying that one embodiment of the application provides The schematic diagram of device, the present embodiment is applied to terminal in this way to be come for example, the terminal can be mobile phone, and number is wide Broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc., such as figure Shown in 5, fingerprint certification device provided by the embodiments of the present application includes:
Module 51 is obtained, for obtaining user fingerprints information by target key, authentication module 52, for getting Finger print information is authenticated;First processing module 53, if for being authenticated successfully to finger print information, and get to target key First user's operation does not trigger the business conduct after finger print information authenticates successfully then.
Optionally, the first user's operation is pushing operation of the user to target key.
Optionally, fingerprint certification device provided by the present application further include:
Second processing module 54, if for being authenticated successfully to finger print information, and getting second user operation, then triggering refers to Business conduct after the success of line authentification of message.
Optionally, second user operation is the operation that user removes finger from target key.
Optionally, target key is any one of Home key, return key or acknowledgement key.Authentication module is specifically used for:
Obtain legal user fingerprints template;User fingerprints information and user fingerprints template are matched.
The fingerprint certification device of the embodiment of the present application body, further includes:
Pushing module 55, if for being authenticated successfully to finger print information, and the first user's operation to target key is got, Prompt information is pushed, then to prompt user that can not carry out business conduct.
Optionally, business conduct is user's payment behavior.
Fingerprint certification device provided by the embodiments of the present application can be used for executing above-mentioned fingerprint verification method, content and effect Fruit can refer to method part, and the embodiment of the present application is without limitation.
Example IV
The application provides a kind of fingerprint recognition mould group, and Fig. 6 is the knot for the fingerprint recognition mould group that one embodiment of the application provides Structure schematic diagram, as shown in fig. 6, fingerprint recognition mould group provided by the present application includes: target key 61 and micro-control unit MCU62.
MCU62 is used for: being obtained user fingerprints information by target key 61, is authenticated to finger print information, and will certification As a result it is sent to processor;If getting the first user's operation by target key 61, the first user's operation is sent to place Device is managed, so that processor is determined according to authentication result when authenticating successfully to finger print information, is not triggered and is referred to according to the first user's operation Business conduct after the success of line authentification of message.
Optionally, the first user's operation is pushing operation of the user to target key 61.
Optionally, MCU62 is also used to:
If getting second user operation by target key 61, second user operation is sent to processor, so that Processor according to authentication result determine finger print information authenticate successfully when, according to second user operation trigger finger print information authenticate at Business conduct after function.
Wherein, the number of MCU62 can be one or more, for example, the quantity of MCU62 is 1, then the MCU62 For obtaining user fingerprints information and authenticating to finger print information, and authentication result is sent to processor, is also used to obtain First user's operation, and the first user's operation is sent to processor, is also used to obtain second user operation, and by second user Operation is sent to processor.For another example the quantity of MCU62 is 2, then it can be first MCU62 for obtaining user fingerprints Information and finger print information is authenticated, and authentication result is sent to processor, second MCU62 is for obtaining user fingerprints Information and finger print information is authenticated, and authentication result is sent to processor, is also used to obtain the first user's operation, and will First user's operation is sent to processor, is also used to obtain second user operation, and second user operation is sent to processor, The present invention to when MCU62 quantity is two, each MCU62 responsible work with no restrictions, as long as can be realized present techniques Scheme.For another example MCU62 quantity is 3, then it can be first MCU62 for obtaining user fingerprints information and will refer to Line information is authenticated, and authentication result is sent to processor, and second MCU62 is for obtaining user fingerprints information and to finger Line information is authenticated, and authentication result is sent to processor, and third MCU62 is operated for obtaining second user, and will Second user operation is sent to processor.
Optionally, second user operation is the operation that user removes finger from target key 61.
Optionally, MCU62 is specifically used for:
Obtain legal user fingerprints template;User fingerprints information and user fingerprints template are matched.
Optionally, MCU62 is also used to:
If authenticating successfully to finger print information, and the first user's operation to target key 61 is got, then pushes prompt letter Breath, to prompt user that can not carry out business conduct.
Optionally, business conduct is user's payment behavior.
Optionally, target key 61 is any one of Home key, return key or acknowledgement key.
Fingerprint recognition mould group provided by the embodiments of the present application can be used for executing above-mentioned fingerprint verification method, content and effect Fruit can refer to method part, and the embodiment of the present application is without limitation.
Embodiment five
One embodiment of the application also provides a kind of terminal device, and Fig. 7 is the terminal device that one embodiment of the application provides Structural schematic diagram, as shown in fig. 7, terminal device includes: fingerprint recognition mould group 71 and processor 72, fingerprint recognition mould group 71 is wrapped Include: target key 711 and micro-control unit 712MCU712 are used for:
User fingerprints information is obtained by target key 711, and the finger print information got is authenticated, to processor 72 send authentication result;If getting the first user's operation by target key 711, the first user's operation is sent to processing Device 72.
Processor 72 is used for: if being authenticated successfully according to authentication result to finger print information, then not according to the first user's operation Trigger the business conduct after finger print information authenticates successfully.
Optionally, the first user's operation is pushing operation of the user to target key 711.
Optionally, MCU712 is also used to:
If getting second user operation by target key 711, second user operation is sent to processor 72;
If processor 72 is grasped be also used to authenticate successfully to finger print information according to authentication result is determining according to second user Make the business conduct after triggering finger print information authenticates successfully.
Optionally, second user operation is the operation that user removes finger from target key 711.
Optionally, MCU712 is specifically used for:
Obtain legal user fingerprints template;User fingerprints information and user fingerprints template are matched.
Optionally, MCU712 is also used to:
If authenticating successfully to finger print information, and the first user's operation to target key 711 is got, then pushes prompt letter Breath, to prompt user that can not carry out business conduct.
Optionally, business conduct is user's payment behavior.
Optionally, target key 711 is any one of Home key, return key or acknowledgement key.
Terminal device provided by the embodiments of the present application can be used for executing above-mentioned fingerprint verification method, and content and effect can With reference to method part, the embodiment of the present application is without limitation.
Embodiment six
One embodiment of the application also provides a kind of computer storage medium, and storage medium includes computer instruction, works as instruction When being computer-executed, so that computer realizes such as above-mentioned fingerprint verification method.
Embodiment seven
One embodiment of the application also provides a kind of computer program product, comprising: computer instruction, when instruction is by computer When execution, so that computer realizes such as above-mentioned fingerprint verification method.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (33)

1. a kind of fingerprint verification method characterized by comprising
User fingerprints information is obtained by target key, and the finger print information got is authenticated;
If authenticating successfully to the finger print information, and the first user's operation to the target key is got, does not then trigger institute State the business conduct after finger print information authenticates successfully.
2. the method according to claim 1, wherein first user's operation is user to the target key Pushing operation.
3. the method according to claim 1, wherein further include:
If authenticating successfully to the finger print information, and the second user operation to the target key is got, then described in triggering Finger print information authenticate successfully after business conduct.
4. according to the method described in claim 3, it is characterized in that, second user operation is user from the target key Remove the operation of finger.
5. method according to claim 1-4, which is characterized in that described to obtain user fingerprints by target key Information, and the finger print information got is authenticated, comprising:
Obtain legal user fingerprints template;
The user fingerprints information and user fingerprints template are matched.
6. method according to claim 1-4, which is characterized in that further include:
If authenticating successfully to the finger print information, and the first user's operation to the target key is got, then pushes prompt Information, to prompt user that can not carry out the business conduct.
7. method according to claim 1-4, which is characterized in that the business conduct is user's payment behavior.
8. method according to claim 1-4, which is characterized in that the target key is Home key, return key Or any one of acknowledgement key.
9. a kind of fingerprint certification device characterized by comprising
Module is obtained, for obtaining user fingerprints information by target key;
Authentication module, for being authenticated to the finger print information got;
First processing module, if for being authenticated successfully to the finger print information, and get and use the first of the target key Family operation, then do not trigger the business conduct after the finger print information authenticates successfully.
10. device according to claim 9, which is characterized in that first user's operation is that user presses the target The pushing operation of key.
11. device according to claim 9, which is characterized in that further include:
Second processing module, if for being authenticated successfully to the finger print information, and get and use the second of the target key Family operation, then trigger the business conduct after the finger print information authenticates successfully.
12. device according to claim 11, which is characterized in that the second user operation is that user presses from the target Key removes the operation of finger.
13. according to the described in any item devices of claim 9-12, which is characterized in that the authentication module is specifically used for:
Obtain legal user fingerprints template;
The user fingerprints information and user fingerprints template are matched.
14. according to the described in any item devices of claim 9-12, which is characterized in that further include:
Pushing module, if for being authenticated successfully to the finger print information, and get the first user behaviour to the target key Make, then prompt information is pushed, to prompt user that can not carry out the business conduct.
15. according to the described in any item devices of claim 9-12, which is characterized in that the business conduct is user's paying bank For.
16. according to the described in any item devices of claim 9-12, which is characterized in that the target key is Home key, returns Any one of key or acknowledgement key.
17. a kind of fingerprint recognition mould group characterized by comprising target key and micro-control unit MCU;
The MCU is used for:
User fingerprints information is obtained by the target key, the finger print information is authenticated, and authentication result is sent To processor;
If getting the first user's operation by the target key, first user's operation is sent to the processing Device is used so that the processor is determined according to the authentication result when authenticating successfully to the finger print information according to described first Family operation does not trigger the business conduct after the finger print information authenticates successfully.
18. fingerprint recognition mould group according to claim 17, which is characterized in that first user's operation is user to institute State the pushing operation of target key.
19. fingerprint recognition mould group according to claim 17, which is characterized in that the MCU is also used to:
If getting second user operation by the target key, second user operation is sent to the processing Device is used so that the processor is determined according to the authentication result when authenticating successfully to the finger print information according to described second Family operation triggers the business conduct after the finger print information authenticates successfully.
20. fingerprint recognition mould group according to claim 19, which is characterized in that second user operation is user from institute State the operation that target key removes finger.
21. the described in any item fingerprint recognition mould groups of 7-20 according to claim 1, which is characterized in that the MCU is specifically used for:
Obtain legal user fingerprints template;
The user fingerprints information and user fingerprints template are matched.
22. the described in any item fingerprint recognition mould groups of 7-20 according to claim 1, which is characterized in that the MCU is also used to:
If authenticating successfully to the finger print information, and the first user's operation to the target key is got, then pushes prompt Information, to prompt user that can not carry out the business conduct.
23. the described in any item fingerprint recognition mould groups of 7-20 according to claim 1, which is characterized in that the business conduct is to use Family payment behavior.
24. the described in any item fingerprint recognition mould groups of 7-20 according to claim 1, which is characterized in that the target key is Any one of Home key, return key or acknowledgement key.
25. a kind of terminal device characterized by comprising fingerprint recognition mould group and processor, the fingerprint recognition mould group packet It includes: target key and micro-control unit MCU;
The MCU is used for:
User fingerprints information is obtained by the target key, and the finger print information got is authenticated, Xiang Suoshu Processor sends authentication result;
If getting the first user's operation by the target key, first user's operation is sent to the processing Device;
The processor is used for:
If being authenticated successfully according to authentication result determination to the finger print information, do not triggered according to first user's operation The finger print information authenticate successfully after business conduct.
26. terminal device according to claim 25, which is characterized in that first user's operation is user to the mesh Mark the pushing operation of key.
27. terminal device according to claim 25, which is characterized in that
The second user is operated and is sent out if being also used to get second user operation by the target key by the MCU Give the processor;
The processor, if be also used to authenticate successfully to the finger print information according to the authentication result is determining, according to described Second user operation triggers the business conduct after the finger print information authenticates successfully.
28. terminal device according to claim 27, which is characterized in that second user operation is user from the mesh Mark key removes the operation of finger.
29. according to the described in any item terminal devices of claim 25-28, which is characterized in that the MCU is specifically used for:
Obtain legal user fingerprints template;
The user fingerprints information and user fingerprints template are matched.
30. according to the described in any item terminal devices of claim 25-28, which is characterized in that the MCU is also used to:
If authenticating successfully to the finger print information, and the first user's operation to the target key is got, then pushes prompt Information, to prompt user that can not carry out the business conduct.
31. according to the described in any item terminal devices of claim 25-28, which is characterized in that the business conduct is user's branch The behavior of paying.
32. according to the described in any item terminal devices of claim 25-28, which is characterized in that the target key be Home key, Any one of return key or acknowledgement key.
33. a kind of computer storage medium, which is characterized in that the storage medium includes computer instruction, when described instruction quilt When computer executes, so that the computer realizes the finger print identifying side as described in any one of claims 1 to 8 claim Method.
CN201880002045.9A 2018-11-02 2018-11-02 Fingerprint verification method, device, equipment and storage medium Pending CN109564604A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/113803 WO2020087527A1 (en) 2018-11-02 2018-11-02 Fingerprint verification method and apparatus, device and storage medium

Publications (1)

Publication Number Publication Date
CN109564604A true CN109564604A (en) 2019-04-02

Family

ID=65872625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880002045.9A Pending CN109564604A (en) 2018-11-02 2018-11-02 Fingerprint verification method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109564604A (en)
WO (1) WO2020087527A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120084204A1 (en) * 2008-03-14 2012-04-05 Research In Motion Limited System and method for making electronic payments from a wireless mobile device
CN105210072A (en) * 2013-05-14 2015-12-30 Lg电子株式会社 Portable device including a fingerprint scanner and method of controlling therefor
CN106062701A (en) * 2016-04-12 2016-10-26 深圳信炜科技有限公司 Electronic device
CN107066197A (en) * 2017-03-08 2017-08-18 广东欧珀移动通信有限公司 The control method and terminal device of terminal device
CN107133799A (en) * 2017-04-28 2017-09-05 上海与德科技有限公司 A kind of method of payment and device based on biological characteristic
CN108156310A (en) * 2017-11-27 2018-06-12 深圳市金立通信设备有限公司 A kind of method and system of finger prints processing, terminal device and computer-readable medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160335469A1 (en) * 2014-04-10 2016-11-17 Kuo-Ching Chiang Portable Device with Security Module
CN105117631B (en) * 2015-08-24 2018-08-31 联想(北京)有限公司 Information processing method and electronic equipment
CN105989495A (en) * 2016-03-07 2016-10-05 李明 Payment method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120084204A1 (en) * 2008-03-14 2012-04-05 Research In Motion Limited System and method for making electronic payments from a wireless mobile device
CN105210072A (en) * 2013-05-14 2015-12-30 Lg电子株式会社 Portable device including a fingerprint scanner and method of controlling therefor
CN106062701A (en) * 2016-04-12 2016-10-26 深圳信炜科技有限公司 Electronic device
CN107066197A (en) * 2017-03-08 2017-08-18 广东欧珀移动通信有限公司 The control method and terminal device of terminal device
CN107133799A (en) * 2017-04-28 2017-09-05 上海与德科技有限公司 A kind of method of payment and device based on biological characteristic
CN108156310A (en) * 2017-11-27 2018-06-12 深圳市金立通信设备有限公司 A kind of method and system of finger prints processing, terminal device and computer-readable medium

Also Published As

Publication number Publication date
WO2020087527A1 (en) 2020-05-07

Similar Documents

Publication Publication Date Title
Kumar et al. Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns
Song et al. Multi-touch authentication using hand geometry and behavioral information
CN105260635B (en) A kind of auth method and system of the mobile terminal based on fingerprint
TWI706269B (en) Service realization method and device
CN105160227A (en) Remote fingerprint verification method, user terminal and fingerprint verification system
Khan et al. Augmented reality-based mimicry attacks on behaviour-based smartphone authentication
US20190130411A1 (en) Method and system for data processing
CN105991281A (en) Identity authentication method, equipment and system
CN107577930A (en) The unblock detection method and touch screen terminal of a kind of touch screen terminal
CN105159475B (en) A kind of characters input method and device
CN105337739B (en) Safe login method, device, server and terminal
CN106778151A (en) Method for identifying ID and device based on person's handwriting
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN109413004B (en) Verification method, device and equipment
CN105005729A (en) Method for unlocking screen based on image, and user terminal
CN111859322A (en) Identity verification method and device and electronic equipment
CN109564604A (en) Fingerprint verification method, device, equipment and storage medium
CN106548347A (en) A kind of processing meanss of financial payment, method and terminal
WO2016095564A1 (en) Identity verification method and device
CN107895114A (en) A kind of management method of encrypted message, electronic equipment and readable storage medium storing program for executing
CN105068725A (en) Screen unlocking method and user terminal
CN105141609B (en) Fingerprint authentication method and relevant apparatus and fingerprint verification system
US20120023549A1 (en) CAPTCHA AND reCAPTCHA WITH SINOGRAPHS
CN112035819A (en) Fingerprint unlocking method and device, electronic equipment and computer readable storage medium
CN107273734B (en) Fingerprint verification method, device, mobile terminal and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190402

RJ01 Rejection of invention patent application after publication