CN110298161A - Identity identifying method and electronic equipment applied to electronic equipment - Google Patents
Identity identifying method and electronic equipment applied to electronic equipment Download PDFInfo
- Publication number
- CN110298161A CN110298161A CN201910583475.0A CN201910583475A CN110298161A CN 110298161 A CN110298161 A CN 110298161A CN 201910583475 A CN201910583475 A CN 201910583475A CN 110298161 A CN110298161 A CN 110298161A
- Authority
- CN
- China
- Prior art keywords
- precision
- electronic equipment
- identification
- image
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
Present disclose provides a kind of identity identifying methods applied to electronic equipment, comprising: is based on specific trigger signal, shoots image;It whether is Given Face image with the first precision identification described image, it is described to have the first power consumption with the identification of the first precision;It whether is the Given Face image with the second precision identification described image if the recognition result with the identification of the first precision is yes, it is described to have the second power consumption with the identification of the second precision;And if the recognition result with the identification of the second precision is yes, it is determined that authentication success, wherein second power is greater than first power, and second precision is higher than first precision.The disclosure additionally provides a kind of electronic equipment.
Description
Technical field
This disclosure relates to a kind of identity identifying method and electronic equipment applied to electronic equipment.
Background technique
With the continuous development of computer technology and Internet technology, various electronic equipment layers go out difference, such as individual calculus
Machine, tablet computer, smart phone, smartwatch, game machine etc..Under some cases, the electronic equipment that user is possessed does not exist
At one's side, these electronic equipments can be potentially encountered going beyond one's commission for other users except the physical extent that user can directly manage to user
It uses.
In the prior art, electronic equipment can pass through various forms of authentications (such as password authentification, fingerprint recognition, people
Face identification etc.) prevent the uses of going beyond one's commission of other users.However these authentication procedures are required to the Gao Gong in electronic equipment
It is carried out under consumption state, the authentication for the user of no access right, leads to electronic equipment largely meaningless power consumption.
Summary of the invention
An aspect of this disclosure provides a kind of identity identifying method applied to electronic equipment, comprising: based on specific
Trigger signal shoots image;It identifies whether the image is Given Face image with the first precision, has the with the identification of the first precision
One power consumption;If with the first precision identify recognition result be it is yes, identify whether the image is Given Face with the second precision
Image has the second power consumption with the identification of the second precision;And if being yes with the recognition result that the second precision identifies, it is determined that
Authentication success.Wherein, the second power is greater than the first power, and the second precision is higher than the first precision.
Another aspect of the present disclosure provides a kind of electronic equipment, comprising: memory, processor group and is stored in memory
When computer program that is upper and can running in processor group, processor group execute the computer program for realizing: based on special
Determine trigger signal, shoots image;It identifies whether the image is Given Face image with the first precision, has with the identification of the first precision
First power consumption;If with the first precision identify recognition result be it is yes, identify whether the image is particular person with the second precision
Face image has the second power consumption with the identification of the second precision;And if with the second precision identify recognition result be it is yes, really
Determine authentication success.Wherein, the second power is greater than the first power, and the second precision is higher than the first precision.
Optionally, processor group includes: coprocessor and camera processing chip.Coprocessor is passed for receiving by specified
The signal of sensor acquisition, and judge whether the signal is the specific trigger signal, if it is, starting camera handles core
Piece.Camera processing chip is for calling camera module to be shot, so that camera processing chip obtains described image.
Optionally, coprocessor includes at least one of following: embedded controller and sensing central controller.
Optionally, specified sensor includes at least one of following: infrared sensor and range sensor.
Optionally, coprocessor is also used to judge whether the signal is characterized in the predetermined model relative to the electronic equipment
Enclose it is interior there are barrier and the movement towards electronic equipment has occurred in the barrier in the given time, if it is, determining should
Signal is specific trigger signal.
Optionally, processor group further includes chipset and processor.Camera processing chip is also used to first essence
Whether degree identification described image is Given Face image, if it is, wake up instruction is sent to chipset, so that chipset indicates
Processor carries out wake-up starting.Whether processor is used to using the second power be Given Face figure with the second precision identification image
Picture, if it is, determining authentication success, and the operation interface of output electronic equipment.
Optionally, processor group further includes chipset and processor.Camera processing chip is also used to the knowledge of the first precision
Whether the image is not Given Face image, if it is, sending confirmation instruction to coprocessor.Coprocessor is also used to connecing
After receiving confirmation instruction, wake up instruction is sent to chipset, so that chipset instruction processor carries out wake-up starting.Processor is used
In whether being Given Face image with the second precision identification image, if it is, determining authentication success, and exports electronics and set
Standby operation interface.
Optionally, electronic equipment further includes switching circuit.Camera processing chip is also used to through switching circuit to chip
Group sends the wake up instruction.And/or coprocessor be also used to receive confirmation instruction after, by switching circuit to
Chipset sends wake up instruction.
Optionally, it is also used to realize when processor group executes computer program: if the first precision recognition result is no, guarantor
Hold the non-wake-up states of processor.
Another aspect of the present disclosure provides a kind of computer readable storage medium, is stored with computer executable instructions,
Described instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to
It enables, described instruction is when executed for realizing method as described above.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the application scenarios of identity identifying method and electronic equipment according to an embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the process of the identity identifying method applied to electronic equipment according to the embodiment of the present disclosure
Figure;
Fig. 3 diagrammatically illustrates the frame of the electronic equipment for being adapted for carrying out identity identifying method according to the embodiment of the present disclosure
Figure;
Fig. 4 A diagrammatically illustrates the schematic diagram of the authentication procedures according to the embodiment of the present disclosure;
Fig. 4 B diagrammatically illustrates the schematic diagram of the authentication procedures according to another embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the frame of the identification authentication system according to an embodiment of the present disclosure applied to electronic equipment
Figure;And
Fig. 6 diagrammatically illustrates the block diagram of electronic equipment according to an embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary
, and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining
Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin
It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid
Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein
The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of
Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood
Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification
Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to
Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C "
Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or
System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come
Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least
One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have
B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart
Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer,
The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with
Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard
The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger
The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system
System uses or instruction execution system is combined to use.
Embodiment of the disclosure provides a kind of identity identifying method and electronic equipment applied to electronic equipment.The body
Identity authentication method may include trigger process, the first identification process and the second identification process.In trigger process, it is based on certain trigger
Signal shoots image.It whether is Given Face figure with the image that the identification of the first precision is captured subsequently into the first identification process
Picture, first identification process have the first power consumption.In the case where the recognition result of the first cognitive phase, which is, is, know into second
Whether other process is Given Face image with the image that the identification of the second precision is captured, which has the second function
Consumption, the second power consumption is greater than the first power consumption, and the second precision is higher than the first precision.It is yes in the recognition result of the second cognitive phase
In the case of, determine authentication success.
Fig. 1 diagrammatically illustrates the application scenarios of identity identifying method and electronic equipment according to an embodiment of the present disclosure.
It should be noted that being only the example that can apply the scene of the embodiment of the present disclosure shown in Fig. 1, to help those skilled in the art
Understand the technology contents of the disclosure, but is not meant to that the embodiment of the present disclosure may not be usable for other equipment, system, environment or field
Scape.
As shown in Figure 1, illustrating the process that electronic equipment 110 carries out authentication to user 120.As shown in Fig. 1 (1),
When needing using electronic equipment 110 trigger action occurs for user 120, and electronic equipment 110 is called in response to the trigger action
Camera module shoots image, carries out recognition of face to the image.Then as shown in Fig. 1 (2), electronic equipment 110 passes through institute
The image of shooting is matched with facial image is prestored, and obtains the face recognition result about user 120.If identified successfully,
Allow user 120 to use electronic equipment 110, if recognition failures, user 120 is forbidden to use electronic equipment 110.
Electronic equipment 110 shown in FIG. 1 can be laptop, can have a camera or multiple camera shootings
Head has the computing capability for carrying out recognition of face.In other embodiments, electronic equipment 100 can be can obtain image and
Support the various electronic equipments of face recognition algorithms, including but not limited to smart phone, smartwatch, intelligent glasses, plate electricity
Brain, pocket computer on knee and desktop computer etc., herein with no restrictions.
Fig. 2 diagrammatically illustrates the process of the identity identifying method applied to electronic equipment according to the embodiment of the present disclosure
Figure.
As shown in Fig. 2, this method includes operation S201~S204.
In operation S201, it is based on specific trigger signal, shoots image.
Wherein, electronic equipment can periodically obtain the signal of characterization Self-variation or external environment variation, and judge
Whether acquired signal meets specified conditions, if it is, determination gets specific trigger signal, in response to the certain trigger
Signal can enable camera module shooting image, carry out identification certification to the captured image so as to subsequent.For example, obtaining
When the characterization got has user that specific behavior occurs about electronic equipment, determine that the signal is specific trigger signal.The spy
The decision rule for determining trigger signal can be configured according to actual needs, herein with no restrictions.
In operation S202, identify whether captured image is Given Face image with the first precision.It is described with the first precision
It carries out identification and has the first power consumption.
Wherein, Given Face image can be one or more that is pre-stored, having access right to electronic equipment
The facial image of user.Image captured by aforesaid operations S201 and Given Face image are carried out feature by this operation S202
Match, when matching degree meets the first precision, confirm successful match, confirms that captured image is Given Face image.It will be with
The process that first precision carries out recognition of face is known as the first identification process, which has the first power consumption.First
In the case that the recognition result of identification process is no, authentication failure can be directly determined.
Next, in operation S203, if with the recognition result that the first precision is identified be it is yes, known with the second precision
Whether not captured image is Given Face image, carries out identification with the second precision and has the second power consumption.
In the case where the recognition result of the first identification process of aforesaid operations S202, which is, is, this operation S203 is by aforesaid operations
Image captured by S201 and Given Face image carry out characteristic matching, when matching degree meets the second precision, confirmation matching
Success confirms that captured image is Given Face image.The process for carrying out recognition of face with the second precision is known as the second knowledge
Other process, second identification process have the second power consumption.Wherein, the second power consumption is greater than the first power consumption, and the second precision is higher than first
Precision.
Next, in operation S204, if being yes with the recognition result that the second precision is identified, it is determined that authentication
Success.
It will be understood by those skilled in the art that be based on aforesaid operations S201~S204, the precision of the first identification process it is low and
Low in energy consumption, the precision of the second identification process is high and power consumption is high.Method shown in Fig. 2 is first based on first when carrying out authentication
Identification process carries out rough recognition of face, after determining preliminary matches, then based on the accurate recognition of face of the second identification process progress.By
This realizes the primary filtration for carrying out recognition of face to a fairly large number of image in the state of electronic equipment low-power consumption, filters out
It may be the image for the user that there is access right to electronic equipment.Again the electronic equipment high power consumption in the state of to filtering out
Image carries out the recognition of face of high safety grade, determines identity authentication result according to secondary recognition result, both can guarantee body
The accuracy of part certification, moreover it is possible to reduce the overall power of electronic equipment.
For example, user A a period of time away from keyboard, the electronic equipment during using electronic equipment enter low-power consumption
State, (sleep) state of such as sleeping, the power supply of most of component is cut off in electronic equipment at this time, only retains a small amount of component
Operation.To avoid during user A leaves, goes beyond one's commission the other users that the electronic equipment does not have access right and use the electronics
Equipment, using the authentication for carrying out user according to the identity identifying method of the embodiment of the present disclosure.
Under one scene, the user B which does not have access right is attempted to use the electronic equipment.Electronics is set
It is standby to detect that barrier is approached and reached in the preset range relative to the electronic equipment, it determines and gets certain trigger letter
Number, starting camera module shoots image, which includes the facial image of user B.The first identification process is carried out, by the image
The characteristic matching of the first precision is carried out with the facial image of the user A prestored, it fails to match, and active user's body directly can be confirmed
Part authentification failure, no longer execution subsequent operation.Electronic equipment remains low power consumpting state, electronics in first identification process
Equipment is not waken up (wake up).First identification process prevents the unnecessary wake operation of electronic equipment.
Under another scene, user A return continues to use the electronic equipment.Electronic equipment has detected barrier close to simultaneously
It reaches relative in the preset range of the electronic equipment, determines and get specific trigger signal, start camera module shooting figure
Picture, the image include the facial image of user A.The first identification process is first carried out, by the face figure of the image and the user A prestored
Characteristic matching as carrying out the first precision, successful match show that currently carrying out the user of authentication may be with the right to use
The user of limit.At this point, electronic equipment executes wake operation, restore the power-off of each component, i.e., restores supreme function from low power consumpting state
Consumption state.Then the second identification process is carried out again, and the facial image of captured image and the user A prestored are subjected to the second essence
The characteristic matching of (second the first precision of precision >) is spent, successful match determines that the current user for carrying out authentication is that have to make
With the user of permission.At this point, electronic equipment can according to entering the data recovery operation interface that is saved before low power consumpting state,
Active user A is allowed to continue to use the electronic equipment.Such as user A is left using electronic equipment viewing film midway
The scene returned again, by above-mentioned first identification process and the second identification process, after the authentication success for determining user A, electricity
Sub- equipment is according to the continuation broadcast interface for entering the film that the data saved before low power consumpting state output user A is watched.
For another example electronic equipment is currently at off-mode, the power supply of most of component is cut off in electronic equipment at this time,
Only a small amount of component remains operational.Electronic equipment start process is carried out using according to the identity identifying method of the embodiment of the present disclosure
Authentication.When there is user to want using the electronic equipment, electronic equipment detected barrier approach and reach relative to
It in the preset range of the electronic equipment, determines and gets specific trigger signal, starting camera module shoots image.First carry out
The image and Given Face image are carried out the characteristic matching of the first precision by one identification process, if the first identification process matches
Failure, then showing active user not is the user with access right, keeps the off-mode of electronic equipment.If the first identification
Process compatible success, then show that active user may be the user with access right, the booting that can execute electronic equipment is opened
It is dynamic, so that electronic equipment enters high power consumption state from low power consumpting state.Then the second identification process is carried out again, by captured figure
Characteristic matching as carrying out the second precision (second the first precision of precision >) with Given Face image.If the second identification process
With success, it is determined that active user is the user with access right, and electronic equipment can export operation interface (such as output table
Face interface), allow active user to use the operating system of electronic equipment by the operation interface.
Fig. 3 diagrammatically illustrates the electronics for being adapted for carrying out above-described identity identifying method according to the embodiment of the present disclosure
The block diagram of equipment.
As shown in figure 3, electronic equipment 300 includes processor group 310 and memory 320.Calculating is stored in memory 320
Machine program, the computer program can be run in processor group 310, and processor group 310 can be executed to be implemented according to the disclosure
The identity identifying method of example.The principle for executing identity identifying method to the processor group 310 in electronic equipment 300 below is said
It is bright.
In one embodiment of the present disclosure, as shown in figure 3, processor group 310 includes: coprocessor 311, at camera
Manage chip 312, chipset 313 and processor 314.
Coprocessor 311 judges that the signal is for receiving the signal acquired by specified sensor (not shown)
No is specific trigger signal.In the case where the judgment result is yes, coprocessor 311 starts camera processing chip 312, camera shooting
Head processing chip 312 calls camera module (not shown) to be shot after starting, and camera processing chip 312 is taken the photograph
The image as captured by head module, to carry out the first identification process.Wherein, coprocessor 311 can be in the low of electronic equipment 300
It is remained operational under power consumption state.Specified sensor can be the component of electronic equipment 300 itself, be also possible to electronic equipment 300
External component.During coprocessor 311 receives signal and judges whether the signal is specific trigger signal, Yi Ji
During camera handles the acquisition image of chip 312 and carries out the first identification, chipset 313 and processor 314 can be located
In off working state, so that electronic equipment 300 keeps low-power consumption in above process.
For example, coprocessor 311 can be the embedded controller (Embedded in electronic equipment 300
Controller, EC) or sensing central controller (Sensor Hub).Embedded controller is the micro-control in electronic equipment 300
Device processed, for the various system tasks that processing operation system can not be handled, the internal flash memory also with certain capacity itself
(Flash) program code is stored.In the power-offstate, embedded controller is always maintained at operation, and can wait user's
Boot-strap information.And after starting up, embedded controller can be used as the equipment such as keyboard controller, charging indicator light, fan
Control, also can control the states such as the standby of electronic equipment 300, suspend mode.Sensing central controller is that can obtain, integrate simultaneously
Handle the microprocessor or pilot controller of the data from different sensors.Under some cases, sensing central controller can be with
It is integrated in embedded controller.
As an optional embodiment, coprocessor 311 receives the signal acquired by specified sensor, and judges the letter
Number whether it is that the process of specific trigger signal may is that coprocessor 311 receives the signal that acquire by specified sensor, judges this
Signal whether be characterized in the preset range relative to electronic equipment 300 there are barrier and the barrier in the given time
The movement towards electronic equipment 300 has occurred.If it is judged that be it is yes, then coprocessor 311 determine the signal be specific touching
It signals.
For example, specified sensor may include infrared sensor and range sensor, coprocessor 311 can be based on by red
The signal of outer sensor acquisition determines whether there is barrier, and further, coprocessor 311 can be based on by infrared sensor
The signal of acquisition determines whether there is human body.Coprocessor 311 can determine obstacle based on the signal acquired by range sensor
The relative positional relationship of object and electronic equipment 300.In conjunction with infrared sensor and range sensor signal collected, coprocessor
311 may determine whether human body close to electronic equipment 300 to preset range in.In more simplified example, specified sensor
Range sensor can be only included, coprocessor 311 can determine whether obstacle based on the signal acquired by range sensor
Object close to electronic equipment 300 to preset range in.
Below with reference to Fig. 4 A~4B, illustrate the authentication procedures of electronic equipment 300 in conjunction with specific embodiments.Wherein, scheme
4A diagrammatically illustrates the schematic diagram of the authentication procedures according to the embodiment of the present disclosure, and Fig. 4 B is diagrammatically illustrated according to this public affairs
Open the schematic diagram of the authentication procedures of another embodiment.In the above-described embodiments, specified sensor is flight time (Time
Of flight, TOF) range sensor.Coprocessor 311 is embedded controller or sensing central controller.
Embodiment one
As shown in Figure 4 A, the appended drawing reference in figure " 1 ", " 2 ", " 3 ", " 4 " and " 5 " indicates the interaction sequences between component.
Coprocessor 311 receives the signal acquired by specified sensor, and judges whether the signal has characterized barrier and set close to electronics
For 300 and reach in the preset range (such as 1 meter) relative to electronic equipment 300.In the case where the judgment result is yes, association is handled
Device 311 starts camera and handles chip 312, and camera processing chip 312 calls camera module to be shot, images after starting
Head processing chip 312 obtains the first image captured by camera module.Camera processing chip 312 executes first and identified
First image and Given Face image are carried out characteristic matching by journey.If matching degree does not meet the first precision, directly determine
Authentication failure keeps the off working state of chipset 313 and processor 314, that is, keeps the low-power consumption shape of electronic equipment 300
State.
If the matching degree of the first identification process meets the first precision, camera handles chip 312 to chipset 313
Send wake up instruction.Chipset 313 is as the portion for being responsible for connecting between processor 314 and other component in electronic equipment 300
Part indicates that processor 314 carries out wake-up starting after receiving wake up instruction.For example, chipset 313 indicate processor 314 into
Row wake up starting when, processor 314 start to work, from the FFFF:0000 of address execute instruction, being placed on here is one
Jump instruction is jumped at the starting code of BIOS (Basic Input Output System, basic input output system).
After BIOS starting, electronic equipment 300 executes a series of start-up operations such as hardware check, until control is handed to operation system
System, the kernel of operating system are loaded, and operating system brings into operation.But before the identification of carry out second, the operation of operating system
Interface cannot still be exported to active user, i.e. active user's operating system for not being available electronic equipment 300 also.Processor 314
After carrying out wake-up starting, the power consumption of electronic equipment 300 is improved.Then, processor 314 executes the second identification process, by above-mentioned the
One image and Given Face image carry out characteristic matching, if matching degree meets the second precision (second the first essence of precision >
Degree), it is determined that authentication success, and the operation interface of output electronic equipment 300, so that active user can pass through the operation
Interface uses the operating system of electronic equipment 300.If the matching degree of the second identification process does not meet the second precision, it is determined that
Authentication failure does not provide the operation interface for interacting with operating system to active user.Wherein, processor 314 can be with
Camera processing chip 312 is called to execute above-mentioned second identification process.
Embodiment two
As shown in Figure 4 B, the appended drawing reference in figure " 1 ", " 2 ", " 3 ", " 4 ", " 5 ", " 6 " and " 7 " indicates the friendship between component
Mutually sequence.Coprocessor 311 receives the signal acquired by specified sensor, and it is close to judge whether the signal has characterized barrier
Electronic equipment 300 and reach in preset range (such as 1 meter) relative to electronic equipment 300.In the case where the judgment result is yes,
Coprocessor 311 starts camera and handles chip 312, and camera processing chip 312 calls camera module to be clapped after starting
It takes the photograph, camera handles chip 312 and obtains the second image captured by camera module.Camera handles chip 312 and executes first
Second image and Given Face image are carried out characteristic matching by identification process.If matching degree does not meet the first precision, directly
Determining authentication failure is connect, keeps the off working state of chipset 313 and processor 314, i.e., holding electronic equipment 300 is low
Power consumption state.
If the matching degree that the first identification process obtains meets the first precision, camera handles chip 312 at association
It manages device 311 and sends confirmation instruction.Coprocessor 311 sends wake up instruction after receiving confirmation instruction, to chipset 313,
So that chipset 313 indicates that processor 314 carries out wake-up starting.After processor 314 carries out wake-up starting, electronic equipment 300
Power consumption improves.Then, processor 314 executes the second identification process, identifies whether above-mentioned second image is specific with the second precision
Facial image, if it is, authentication success is determined, and the operation interface of output electronic equipment 300, if it is not, then determining
Authentication failure does not provide the operation interface for interacting with operating system to active user.Wherein, processor 314 can be with
Camera processing chip 312 is called to execute above-mentioned second identification process.
Further, in one embodiment of the present disclosure, electronic equipment 310 can also include switching circuit.Join again
Examine Fig. 4 B, coprocessor 311, can be by switching circuit 315 to chipset 313 when sending wake up instruction to chipset 313
Send wake up instruction.Similarly, in the authentication procedures shown in Fig. 4 A, camera handles chip 312 to chipset 313
When sending wake up instruction, wake up instruction can be sent to chipset 313 by switching circuit 315.
Fig. 5 diagrammatically illustrates the frame of the identification authentication system according to an embodiment of the present disclosure applied to electronic equipment
Figure.
As shown in figure 5, the identification authentication system 500 for being applied to electronic equipment includes: that image collection module 510, first is known
Other module 520, the second identification module 530 and authentication module 540.
Image collection module 510 shoots image for being based on specific trigger signal.
Whether the first identification module 520 should be with for being Given Face image with the captured image of the first precision identification
The process that first precision is identified has the first power consumption.
Second identification module 530, for the recognition result identified with the first precision be in the case where, with second
Whether the captured image of precision identification is Given Face image, should have the second function with the process that the second precision is identified
Consumption.
Authentication module 540, for determining that identity is recognized in the case where the recognition result identified with the second precision, which is, is
It demonstrate,proves successfully.
Wherein, the second power is greater than the first power, and the second precision is higher than the first precision.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution
Art problem, the function of realization and the technical effect reached respectively with the implementation of corresponding step each in method section Example
Mode, the technical issues of solving, the function of realization and the technical effect that reaches are same or like, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement
A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son
Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule,
Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate
Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity
Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real
Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality
It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement
Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, in image collection module 510, the first identification module 520, the second identification module 530 and authentication module 540
Any number of may be incorporated in a module is realized or any one module therein can be split into multiple modules.
Alternatively, at least partly function of one or more modules in these modules can mutually be tied at least partly function of other modules
It closes, and is realized in a module.In accordance with an embodiment of the present disclosure, image collection module 510, the first identification module 520, second
At least one of identification module 530 and authentication module 540 can at least be implemented partly as hardware circuit, such as scene can
It programs gate array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated
Integrated circuit (ASIC), or can be by carrying out hardware or the firmwares such as any other rational method that is integrated or encapsulating to circuit
It realizes, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined
To realize.Alternatively, in image collection module 510, the first identification module 520, the second identification module 530 and authentication module 540
At least one can at least be implemented partly as computer program module, can be with when the computer program module is run
Execute corresponding function.
Fig. 6 diagrammatically illustrates the electronic equipment for being adapted for carrying out method as described above according to another embodiment of the disclosure
Block diagram.Electronic equipment shown in Fig. 6 is only an example, should not function to the embodiment of the present disclosure and use scope bring
Any restrictions.
As shown in fig. 6, electronic equipment 600 includes processor group 610 and computer readable storage medium 620.The electronics is set
Standby 600 can execute the method according to the embodiment of the present disclosure.
Specifically, processor group 610 for example may include general purpose microprocessor, instruction set processor and/or related chip
Group and/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor group 610 can also include for delaying
Deposit the onboard storage device of purposes.Processor group 610 can be the difference for executing the method flow according to the embodiment of the present disclosure
The single treatment unit of movement either multiple processing units.
Computer readable storage medium 620, such as can be non-volatile computer readable storage medium, specific example
Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as
Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 620 may include computer program 621, which may include generation
Code/computer executable instructions execute processor 610 according to the embodiment of the present disclosure
Method or its any deformation.
Computer program 621 can be configured to have the computer program code for example including computer program module.Example
Such as, in the exemplary embodiment, the code in computer program 621 may include one or more program modules, for example including
621A, module 621B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can
To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 610
When execution, processor 610 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, image collection module 510, the first identification module 520,530 and of the second identification module
At least one of authentication module 540 can be implemented as the computer program module with reference to Fig. 6 description, by processor 610
When execution, data processing method described above may be implemented.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality
It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/
In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts
When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium
Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory
(ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light
Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can
With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist
In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure
Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents,
A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment,
But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.
Claims (10)
1. a kind of identity identifying method applied to electronic equipment, comprising:
Based on specific trigger signal, image is shot;
It whether is Given Face image with the first precision identification described image, it is described to have the first power consumption with the identification of the first precision;
It whether is the spy with the second precision identification described image if the recognition result with the identification of the first precision is yes
Determine facial image, it is described to have the second power consumption with the identification of the second precision;And
If the recognition result with the identification of the second precision is yes, it is determined that authentication success,
Wherein, second power is greater than first power, and second precision is higher than first precision.
2. a kind of electronic equipment, comprising: memory, processor group and storage can be run on a memory and in processor group
When computer program, the processor group execute the computer program for realizing:
Based on specific trigger signal, image is shot;
It whether is Given Face image with the first precision identification described image, it is described to have the first power consumption with the identification of the first precision;
It whether is the spy with the second precision identification described image if the recognition result with the identification of the first precision is yes
Determine facial image, it is described to have the second power consumption with the identification of the second precision;And
If the recognition result with the identification of the second precision is yes, it is determined that authentication success,
Wherein, second power is greater than first power, and second precision is higher than first precision.
3. electronic equipment according to claim 2, wherein the processor group includes: coprocessor and camera processing
Chip;
The coprocessor for receiving the signal acquired by specified sensor, and judges whether the signal is described specific
Trigger signal, if it is, starting camera handles chip;And
The camera handles chip, for calling camera module to be shot, so that camera processing chip obtains
Described image.
4. electronic equipment according to claim 3, wherein the coprocessor includes at least one of following: embedded control
Device processed and sensing central controller.
5. electronic equipment according to claim 3, wherein the specified sensor includes at least one of following: infrared biography
Sensor and range sensor.
6. electronic equipment according to claim 3, wherein
The coprocessor, is also used to judge whether the signal is characterized in the preset range memory relative to the electronic equipment
In barrier and the movement towards the electronic equipment has occurred in the barrier in the given time, if it is, determining institute
Stating signal is the specific trigger signal.
7. electronic equipment according to claim 3, wherein the processor group further includes chipset and processor;
The camera handles chip, is also used to identify whether described image is Given Face image with first precision, such as
Fruit is then to send wake up instruction to the chipset, so that the chipset indicates that the processor carries out wake-up starting;And
The processor, for identifying whether described image is Given Face image using the second power with the second precision, if
It is, it is determined that authentication success, and export the operation interface of the electronic equipment.
8. electronic equipment according to claim 3, wherein the processor group further includes chipset and processor;
The camera handles chip, is also used to identify whether described image is Given Face image with first precision, such as
Fruit is then to send confirmation instruction to the coprocessor;
The coprocessor is also used to after receiving the confirmation instruction, and Xiang Suoshu chipset sends wake up instruction, so that institute
It states chipset and indicates that the processor carries out wake-up starting;And
The processor, for whether being Given Face image with second precision identification described image, if it is, determining
Authentication success, and export the operation interface of the electronic equipment.
9. electronic equipment according to claim 7 or 8, wherein the processor group further includes switching circuit;
The camera handles chip, is also used to send the wake up instruction to the chipset by the switching circuit;And
And/or person
The coprocessor is also used to after receiving the confirmation instruction, is sent out by the switching circuit to the chipset
Send the wake up instruction.
10. electronic equipment according to claim 7 or 8, wherein the processor group is gone back when executing the computer program
For realizing:
If the first precision recognition result be it is no, keep the non-wake-up states of the processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910583475.0A CN110298161A (en) | 2019-06-28 | 2019-06-28 | Identity identifying method and electronic equipment applied to electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910583475.0A CN110298161A (en) | 2019-06-28 | 2019-06-28 | Identity identifying method and electronic equipment applied to electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110298161A true CN110298161A (en) | 2019-10-01 |
Family
ID=68029679
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910583475.0A Pending CN110298161A (en) | 2019-06-28 | 2019-06-28 | Identity identifying method and electronic equipment applied to electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110298161A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309137A (en) * | 2020-02-18 | 2020-06-19 | 深圳云天励飞技术有限公司 | Chip control method and device, chip and terminal equipment |
CN111641718A (en) * | 2020-06-01 | 2020-09-08 | 北京弘远博学科技有限公司 | Method for authenticating APP identity at mobile phone terminal |
CN113781969A (en) * | 2021-09-27 | 2021-12-10 | 联想(北京)有限公司 | Backlight adjusting method and device and electronic equipment |
CN114004727A (en) * | 2020-07-28 | 2022-02-01 | Oppo广东移动通信有限公司 | Co-processing chip and electronic equipment |
CN114531947A (en) * | 2020-08-31 | 2022-05-24 | 华为技术有限公司 | Electronic device and response operation method of electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103345360B (en) * | 2013-06-21 | 2016-02-10 | 广东欧珀移动通信有限公司 | A kind of intelligent terminal touch screen gesture identification method |
CN105844130A (en) * | 2016-03-17 | 2016-08-10 | 上海与德通讯技术有限公司 | Fingerprint unlocking method under standby state |
CN105956579A (en) * | 2016-05-27 | 2016-09-21 | 国创科视科技股份有限公司 | Rapid finger vein identification method integrating fuzzy template and point characteristics |
CN109388925A (en) * | 2017-08-03 | 2019-02-26 | 上海聚虹光电科技有限公司 | A kind of mobile device wakes up and unlocking method |
-
2019
- 2019-06-28 CN CN201910583475.0A patent/CN110298161A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103345360B (en) * | 2013-06-21 | 2016-02-10 | 广东欧珀移动通信有限公司 | A kind of intelligent terminal touch screen gesture identification method |
CN105844130A (en) * | 2016-03-17 | 2016-08-10 | 上海与德通讯技术有限公司 | Fingerprint unlocking method under standby state |
CN105956579A (en) * | 2016-05-27 | 2016-09-21 | 国创科视科技股份有限公司 | Rapid finger vein identification method integrating fuzzy template and point characteristics |
CN109388925A (en) * | 2017-08-03 | 2019-02-26 | 上海聚虹光电科技有限公司 | A kind of mobile device wakes up and unlocking method |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309137A (en) * | 2020-02-18 | 2020-06-19 | 深圳云天励飞技术有限公司 | Chip control method and device, chip and terminal equipment |
CN111309137B (en) * | 2020-02-18 | 2021-07-06 | 深圳云天励飞技术有限公司 | Chip control method and device, chip and terminal equipment |
CN111641718A (en) * | 2020-06-01 | 2020-09-08 | 北京弘远博学科技有限公司 | Method for authenticating APP identity at mobile phone terminal |
CN111641718B (en) * | 2020-06-01 | 2023-06-20 | 北京弘远博学科技有限公司 | Mobile phone terminal APP identity authentication method |
CN114004727A (en) * | 2020-07-28 | 2022-02-01 | Oppo广东移动通信有限公司 | Co-processing chip and electronic equipment |
CN114531947A (en) * | 2020-08-31 | 2022-05-24 | 华为技术有限公司 | Electronic device and response operation method of electronic device |
CN113781969A (en) * | 2021-09-27 | 2021-12-10 | 联想(北京)有限公司 | Backlight adjusting method and device and electronic equipment |
CN113781969B (en) * | 2021-09-27 | 2024-04-23 | 联想(北京)有限公司 | Backlight adjusting method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110298161A (en) | Identity identifying method and electronic equipment applied to electronic equipment | |
CN110851809B (en) | Fingerprint identification method and device and touch screen terminal | |
CN106066986B (en) | Method and apparatus for sensing a fingerprint | |
AU2017293746B2 (en) | Electronic device and operating method thereof | |
US20180268121A1 (en) | Method For Unlocking Screen Of Terminal Having Fingerprint Identification Sensors And Terminal | |
US9576121B2 (en) | Electronic device and authentication system therein and method | |
CN110088764B (en) | Operation method for iris recognition function and electronic device supporting the same | |
KR102488563B1 (en) | Apparatus and Method for Processing Differential Beauty Effect | |
CN106662970B (en) | Method and device for setting interruption threshold of fingerprint identifier and terminal equipment | |
US9594969B1 (en) | Iris recognition including liveness testing | |
JP2015228219A (en) | Electronic apparatus and fingerprint recognition method | |
KR102575672B1 (en) | Electronic apparatus and operating method thereof | |
US9292753B2 (en) | Parallel face detection and tracking system | |
EP3224757B1 (en) | In-device privacy framework for smart glasses and smart watches | |
CN107784268B (en) | Method and electronic device for measuring heart rate based on infrared sensor | |
CN104318147A (en) | Information processing method and electronic device | |
CN105320867B (en) | Electronic device and fingerprinting method | |
KR102497477B1 (en) | Method for protecting personal information and electronic device thereof | |
EP3104304B1 (en) | Electronic apparatus and method of extracting still images | |
EP3086245A1 (en) | Method and device for sharing picture | |
WO2019011072A1 (en) | Iris live detection method and related product | |
KR20150051888A (en) | Method for controlling power of fingerprint sensor, fingerprint processing device, and electronic device performing thereof | |
CN104866816A (en) | Novel image and fingerprint boot identification method of mobile phone | |
KR20180089226A (en) | Electric device and method for controlling biological sensor | |
KR20140071802A (en) | Shortcut information execution system and method of mobile terminal based face recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |