CN110298161A - Identity identifying method and electronic equipment applied to electronic equipment - Google Patents

Identity identifying method and electronic equipment applied to electronic equipment Download PDF

Info

Publication number
CN110298161A
CN110298161A CN201910583475.0A CN201910583475A CN110298161A CN 110298161 A CN110298161 A CN 110298161A CN 201910583475 A CN201910583475 A CN 201910583475A CN 110298161 A CN110298161 A CN 110298161A
Authority
CN
China
Prior art keywords
precision
electronic equipment
identification
image
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910583475.0A
Other languages
Chinese (zh)
Inventor
肖启华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910583475.0A priority Critical patent/CN110298161A/en
Publication of CN110298161A publication Critical patent/CN110298161A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Present disclose provides a kind of identity identifying methods applied to electronic equipment, comprising: is based on specific trigger signal, shoots image;It whether is Given Face image with the first precision identification described image, it is described to have the first power consumption with the identification of the first precision;It whether is the Given Face image with the second precision identification described image if the recognition result with the identification of the first precision is yes, it is described to have the second power consumption with the identification of the second precision;And if the recognition result with the identification of the second precision is yes, it is determined that authentication success, wherein second power is greater than first power, and second precision is higher than first precision.The disclosure additionally provides a kind of electronic equipment.

Description

Identity identifying method and electronic equipment applied to electronic equipment
Technical field
This disclosure relates to a kind of identity identifying method and electronic equipment applied to electronic equipment.
Background technique
With the continuous development of computer technology and Internet technology, various electronic equipment layers go out difference, such as individual calculus Machine, tablet computer, smart phone, smartwatch, game machine etc..Under some cases, the electronic equipment that user is possessed does not exist At one's side, these electronic equipments can be potentially encountered going beyond one's commission for other users except the physical extent that user can directly manage to user It uses.
In the prior art, electronic equipment can pass through various forms of authentications (such as password authentification, fingerprint recognition, people Face identification etc.) prevent the uses of going beyond one's commission of other users.However these authentication procedures are required to the Gao Gong in electronic equipment It is carried out under consumption state, the authentication for the user of no access right, leads to electronic equipment largely meaningless power consumption.
Summary of the invention
An aspect of this disclosure provides a kind of identity identifying method applied to electronic equipment, comprising: based on specific Trigger signal shoots image;It identifies whether the image is Given Face image with the first precision, has the with the identification of the first precision One power consumption;If with the first precision identify recognition result be it is yes, identify whether the image is Given Face with the second precision Image has the second power consumption with the identification of the second precision;And if being yes with the recognition result that the second precision identifies, it is determined that Authentication success.Wherein, the second power is greater than the first power, and the second precision is higher than the first precision.
Another aspect of the present disclosure provides a kind of electronic equipment, comprising: memory, processor group and is stored in memory When computer program that is upper and can running in processor group, processor group execute the computer program for realizing: based on special Determine trigger signal, shoots image;It identifies whether the image is Given Face image with the first precision, has with the identification of the first precision First power consumption;If with the first precision identify recognition result be it is yes, identify whether the image is particular person with the second precision Face image has the second power consumption with the identification of the second precision;And if with the second precision identify recognition result be it is yes, really Determine authentication success.Wherein, the second power is greater than the first power, and the second precision is higher than the first precision.
Optionally, processor group includes: coprocessor and camera processing chip.Coprocessor is passed for receiving by specified The signal of sensor acquisition, and judge whether the signal is the specific trigger signal, if it is, starting camera handles core Piece.Camera processing chip is for calling camera module to be shot, so that camera processing chip obtains described image.
Optionally, coprocessor includes at least one of following: embedded controller and sensing central controller.
Optionally, specified sensor includes at least one of following: infrared sensor and range sensor.
Optionally, coprocessor is also used to judge whether the signal is characterized in the predetermined model relative to the electronic equipment Enclose it is interior there are barrier and the movement towards electronic equipment has occurred in the barrier in the given time, if it is, determining should Signal is specific trigger signal.
Optionally, processor group further includes chipset and processor.Camera processing chip is also used to first essence Whether degree identification described image is Given Face image, if it is, wake up instruction is sent to chipset, so that chipset indicates Processor carries out wake-up starting.Whether processor is used to using the second power be Given Face figure with the second precision identification image Picture, if it is, determining authentication success, and the operation interface of output electronic equipment.
Optionally, processor group further includes chipset and processor.Camera processing chip is also used to the knowledge of the first precision Whether the image is not Given Face image, if it is, sending confirmation instruction to coprocessor.Coprocessor is also used to connecing After receiving confirmation instruction, wake up instruction is sent to chipset, so that chipset instruction processor carries out wake-up starting.Processor is used In whether being Given Face image with the second precision identification image, if it is, determining authentication success, and exports electronics and set Standby operation interface.
Optionally, electronic equipment further includes switching circuit.Camera processing chip is also used to through switching circuit to chip Group sends the wake up instruction.And/or coprocessor be also used to receive confirmation instruction after, by switching circuit to Chipset sends wake up instruction.
Optionally, it is also used to realize when processor group executes computer program: if the first precision recognition result is no, guarantor Hold the non-wake-up states of processor.
Another aspect of the present disclosure provides a kind of computer readable storage medium, is stored with computer executable instructions, Described instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to It enables, described instruction is when executed for realizing method as described above.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the application scenarios of identity identifying method and electronic equipment according to an embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the process of the identity identifying method applied to electronic equipment according to the embodiment of the present disclosure Figure;
Fig. 3 diagrammatically illustrates the frame of the electronic equipment for being adapted for carrying out identity identifying method according to the embodiment of the present disclosure Figure;
Fig. 4 A diagrammatically illustrates the schematic diagram of the authentication procedures according to the embodiment of the present disclosure;
Fig. 4 B diagrammatically illustrates the schematic diagram of the authentication procedures according to another embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the frame of the identification authentication system according to an embodiment of the present disclosure applied to electronic equipment Figure;And
Fig. 6 diagrammatically illustrates the block diagram of electronic equipment according to an embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer, The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system System uses or instruction execution system is combined to use.
Embodiment of the disclosure provides a kind of identity identifying method and electronic equipment applied to electronic equipment.The body Identity authentication method may include trigger process, the first identification process and the second identification process.In trigger process, it is based on certain trigger Signal shoots image.It whether is Given Face figure with the image that the identification of the first precision is captured subsequently into the first identification process Picture, first identification process have the first power consumption.In the case where the recognition result of the first cognitive phase, which is, is, know into second Whether other process is Given Face image with the image that the identification of the second precision is captured, which has the second function Consumption, the second power consumption is greater than the first power consumption, and the second precision is higher than the first precision.It is yes in the recognition result of the second cognitive phase In the case of, determine authentication success.
Fig. 1 diagrammatically illustrates the application scenarios of identity identifying method and electronic equipment according to an embodiment of the present disclosure. It should be noted that being only the example that can apply the scene of the embodiment of the present disclosure shown in Fig. 1, to help those skilled in the art Understand the technology contents of the disclosure, but is not meant to that the embodiment of the present disclosure may not be usable for other equipment, system, environment or field Scape.
As shown in Figure 1, illustrating the process that electronic equipment 110 carries out authentication to user 120.As shown in Fig. 1 (1), When needing using electronic equipment 110 trigger action occurs for user 120, and electronic equipment 110 is called in response to the trigger action Camera module shoots image, carries out recognition of face to the image.Then as shown in Fig. 1 (2), electronic equipment 110 passes through institute The image of shooting is matched with facial image is prestored, and obtains the face recognition result about user 120.If identified successfully, Allow user 120 to use electronic equipment 110, if recognition failures, user 120 is forbidden to use electronic equipment 110.
Electronic equipment 110 shown in FIG. 1 can be laptop, can have a camera or multiple camera shootings Head has the computing capability for carrying out recognition of face.In other embodiments, electronic equipment 100 can be can obtain image and Support the various electronic equipments of face recognition algorithms, including but not limited to smart phone, smartwatch, intelligent glasses, plate electricity Brain, pocket computer on knee and desktop computer etc., herein with no restrictions.
Fig. 2 diagrammatically illustrates the process of the identity identifying method applied to electronic equipment according to the embodiment of the present disclosure Figure.
As shown in Fig. 2, this method includes operation S201~S204.
In operation S201, it is based on specific trigger signal, shoots image.
Wherein, electronic equipment can periodically obtain the signal of characterization Self-variation or external environment variation, and judge Whether acquired signal meets specified conditions, if it is, determination gets specific trigger signal, in response to the certain trigger Signal can enable camera module shooting image, carry out identification certification to the captured image so as to subsequent.For example, obtaining When the characterization got has user that specific behavior occurs about electronic equipment, determine that the signal is specific trigger signal.The spy The decision rule for determining trigger signal can be configured according to actual needs, herein with no restrictions.
In operation S202, identify whether captured image is Given Face image with the first precision.It is described with the first precision It carries out identification and has the first power consumption.
Wherein, Given Face image can be one or more that is pre-stored, having access right to electronic equipment The facial image of user.Image captured by aforesaid operations S201 and Given Face image are carried out feature by this operation S202 Match, when matching degree meets the first precision, confirm successful match, confirms that captured image is Given Face image.It will be with The process that first precision carries out recognition of face is known as the first identification process, which has the first power consumption.First In the case that the recognition result of identification process is no, authentication failure can be directly determined.
Next, in operation S203, if with the recognition result that the first precision is identified be it is yes, known with the second precision Whether not captured image is Given Face image, carries out identification with the second precision and has the second power consumption.
In the case where the recognition result of the first identification process of aforesaid operations S202, which is, is, this operation S203 is by aforesaid operations Image captured by S201 and Given Face image carry out characteristic matching, when matching degree meets the second precision, confirmation matching Success confirms that captured image is Given Face image.The process for carrying out recognition of face with the second precision is known as the second knowledge Other process, second identification process have the second power consumption.Wherein, the second power consumption is greater than the first power consumption, and the second precision is higher than first Precision.
Next, in operation S204, if being yes with the recognition result that the second precision is identified, it is determined that authentication Success.
It will be understood by those skilled in the art that be based on aforesaid operations S201~S204, the precision of the first identification process it is low and Low in energy consumption, the precision of the second identification process is high and power consumption is high.Method shown in Fig. 2 is first based on first when carrying out authentication Identification process carries out rough recognition of face, after determining preliminary matches, then based on the accurate recognition of face of the second identification process progress.By This realizes the primary filtration for carrying out recognition of face to a fairly large number of image in the state of electronic equipment low-power consumption, filters out It may be the image for the user that there is access right to electronic equipment.Again the electronic equipment high power consumption in the state of to filtering out Image carries out the recognition of face of high safety grade, determines identity authentication result according to secondary recognition result, both can guarantee body The accuracy of part certification, moreover it is possible to reduce the overall power of electronic equipment.
For example, user A a period of time away from keyboard, the electronic equipment during using electronic equipment enter low-power consumption State, (sleep) state of such as sleeping, the power supply of most of component is cut off in electronic equipment at this time, only retains a small amount of component Operation.To avoid during user A leaves, goes beyond one's commission the other users that the electronic equipment does not have access right and use the electronics Equipment, using the authentication for carrying out user according to the identity identifying method of the embodiment of the present disclosure.
Under one scene, the user B which does not have access right is attempted to use the electronic equipment.Electronics is set It is standby to detect that barrier is approached and reached in the preset range relative to the electronic equipment, it determines and gets certain trigger letter Number, starting camera module shoots image, which includes the facial image of user B.The first identification process is carried out, by the image The characteristic matching of the first precision is carried out with the facial image of the user A prestored, it fails to match, and active user's body directly can be confirmed Part authentification failure, no longer execution subsequent operation.Electronic equipment remains low power consumpting state, electronics in first identification process Equipment is not waken up (wake up).First identification process prevents the unnecessary wake operation of electronic equipment.
Under another scene, user A return continues to use the electronic equipment.Electronic equipment has detected barrier close to simultaneously It reaches relative in the preset range of the electronic equipment, determines and get specific trigger signal, start camera module shooting figure Picture, the image include the facial image of user A.The first identification process is first carried out, by the face figure of the image and the user A prestored Characteristic matching as carrying out the first precision, successful match show that currently carrying out the user of authentication may be with the right to use The user of limit.At this point, electronic equipment executes wake operation, restore the power-off of each component, i.e., restores supreme function from low power consumpting state Consumption state.Then the second identification process is carried out again, and the facial image of captured image and the user A prestored are subjected to the second essence The characteristic matching of (second the first precision of precision >) is spent, successful match determines that the current user for carrying out authentication is that have to make With the user of permission.At this point, electronic equipment can according to entering the data recovery operation interface that is saved before low power consumpting state, Active user A is allowed to continue to use the electronic equipment.Such as user A is left using electronic equipment viewing film midway The scene returned again, by above-mentioned first identification process and the second identification process, after the authentication success for determining user A, electricity Sub- equipment is according to the continuation broadcast interface for entering the film that the data saved before low power consumpting state output user A is watched.
For another example electronic equipment is currently at off-mode, the power supply of most of component is cut off in electronic equipment at this time, Only a small amount of component remains operational.Electronic equipment start process is carried out using according to the identity identifying method of the embodiment of the present disclosure Authentication.When there is user to want using the electronic equipment, electronic equipment detected barrier approach and reach relative to It in the preset range of the electronic equipment, determines and gets specific trigger signal, starting camera module shoots image.First carry out The image and Given Face image are carried out the characteristic matching of the first precision by one identification process, if the first identification process matches Failure, then showing active user not is the user with access right, keeps the off-mode of electronic equipment.If the first identification Process compatible success, then show that active user may be the user with access right, the booting that can execute electronic equipment is opened It is dynamic, so that electronic equipment enters high power consumption state from low power consumpting state.Then the second identification process is carried out again, by captured figure Characteristic matching as carrying out the second precision (second the first precision of precision >) with Given Face image.If the second identification process With success, it is determined that active user is the user with access right, and electronic equipment can export operation interface (such as output table Face interface), allow active user to use the operating system of electronic equipment by the operation interface.
Fig. 3 diagrammatically illustrates the electronics for being adapted for carrying out above-described identity identifying method according to the embodiment of the present disclosure The block diagram of equipment.
As shown in figure 3, electronic equipment 300 includes processor group 310 and memory 320.Calculating is stored in memory 320 Machine program, the computer program can be run in processor group 310, and processor group 310 can be executed to be implemented according to the disclosure The identity identifying method of example.The principle for executing identity identifying method to the processor group 310 in electronic equipment 300 below is said It is bright.
In one embodiment of the present disclosure, as shown in figure 3, processor group 310 includes: coprocessor 311, at camera Manage chip 312, chipset 313 and processor 314.
Coprocessor 311 judges that the signal is for receiving the signal acquired by specified sensor (not shown) No is specific trigger signal.In the case where the judgment result is yes, coprocessor 311 starts camera processing chip 312, camera shooting Head processing chip 312 calls camera module (not shown) to be shot after starting, and camera processing chip 312 is taken the photograph The image as captured by head module, to carry out the first identification process.Wherein, coprocessor 311 can be in the low of electronic equipment 300 It is remained operational under power consumption state.Specified sensor can be the component of electronic equipment 300 itself, be also possible to electronic equipment 300 External component.During coprocessor 311 receives signal and judges whether the signal is specific trigger signal, Yi Ji During camera handles the acquisition image of chip 312 and carries out the first identification, chipset 313 and processor 314 can be located In off working state, so that electronic equipment 300 keeps low-power consumption in above process.
For example, coprocessor 311 can be the embedded controller (Embedded in electronic equipment 300 Controller, EC) or sensing central controller (Sensor Hub).Embedded controller is the micro-control in electronic equipment 300 Device processed, for the various system tasks that processing operation system can not be handled, the internal flash memory also with certain capacity itself (Flash) program code is stored.In the power-offstate, embedded controller is always maintained at operation, and can wait user's Boot-strap information.And after starting up, embedded controller can be used as the equipment such as keyboard controller, charging indicator light, fan Control, also can control the states such as the standby of electronic equipment 300, suspend mode.Sensing central controller is that can obtain, integrate simultaneously Handle the microprocessor or pilot controller of the data from different sensors.Under some cases, sensing central controller can be with It is integrated in embedded controller.
As an optional embodiment, coprocessor 311 receives the signal acquired by specified sensor, and judges the letter Number whether it is that the process of specific trigger signal may is that coprocessor 311 receives the signal that acquire by specified sensor, judges this Signal whether be characterized in the preset range relative to electronic equipment 300 there are barrier and the barrier in the given time The movement towards electronic equipment 300 has occurred.If it is judged that be it is yes, then coprocessor 311 determine the signal be specific touching It signals.
For example, specified sensor may include infrared sensor and range sensor, coprocessor 311 can be based on by red The signal of outer sensor acquisition determines whether there is barrier, and further, coprocessor 311 can be based on by infrared sensor The signal of acquisition determines whether there is human body.Coprocessor 311 can determine obstacle based on the signal acquired by range sensor The relative positional relationship of object and electronic equipment 300.In conjunction with infrared sensor and range sensor signal collected, coprocessor 311 may determine whether human body close to electronic equipment 300 to preset range in.In more simplified example, specified sensor Range sensor can be only included, coprocessor 311 can determine whether obstacle based on the signal acquired by range sensor Object close to electronic equipment 300 to preset range in.
Below with reference to Fig. 4 A~4B, illustrate the authentication procedures of electronic equipment 300 in conjunction with specific embodiments.Wherein, scheme 4A diagrammatically illustrates the schematic diagram of the authentication procedures according to the embodiment of the present disclosure, and Fig. 4 B is diagrammatically illustrated according to this public affairs Open the schematic diagram of the authentication procedures of another embodiment.In the above-described embodiments, specified sensor is flight time (Time Of flight, TOF) range sensor.Coprocessor 311 is embedded controller or sensing central controller.
Embodiment one
As shown in Figure 4 A, the appended drawing reference in figure " 1 ", " 2 ", " 3 ", " 4 " and " 5 " indicates the interaction sequences between component. Coprocessor 311 receives the signal acquired by specified sensor, and judges whether the signal has characterized barrier and set close to electronics For 300 and reach in the preset range (such as 1 meter) relative to electronic equipment 300.In the case where the judgment result is yes, association is handled Device 311 starts camera and handles chip 312, and camera processing chip 312 calls camera module to be shot, images after starting Head processing chip 312 obtains the first image captured by camera module.Camera processing chip 312 executes first and identified First image and Given Face image are carried out characteristic matching by journey.If matching degree does not meet the first precision, directly determine Authentication failure keeps the off working state of chipset 313 and processor 314, that is, keeps the low-power consumption shape of electronic equipment 300 State.
If the matching degree of the first identification process meets the first precision, camera handles chip 312 to chipset 313 Send wake up instruction.Chipset 313 is as the portion for being responsible for connecting between processor 314 and other component in electronic equipment 300 Part indicates that processor 314 carries out wake-up starting after receiving wake up instruction.For example, chipset 313 indicate processor 314 into Row wake up starting when, processor 314 start to work, from the FFFF:0000 of address execute instruction, being placed on here is one Jump instruction is jumped at the starting code of BIOS (Basic Input Output System, basic input output system). After BIOS starting, electronic equipment 300 executes a series of start-up operations such as hardware check, until control is handed to operation system System, the kernel of operating system are loaded, and operating system brings into operation.But before the identification of carry out second, the operation of operating system Interface cannot still be exported to active user, i.e. active user's operating system for not being available electronic equipment 300 also.Processor 314 After carrying out wake-up starting, the power consumption of electronic equipment 300 is improved.Then, processor 314 executes the second identification process, by above-mentioned the One image and Given Face image carry out characteristic matching, if matching degree meets the second precision (second the first essence of precision > Degree), it is determined that authentication success, and the operation interface of output electronic equipment 300, so that active user can pass through the operation Interface uses the operating system of electronic equipment 300.If the matching degree of the second identification process does not meet the second precision, it is determined that Authentication failure does not provide the operation interface for interacting with operating system to active user.Wherein, processor 314 can be with Camera processing chip 312 is called to execute above-mentioned second identification process.
Embodiment two
As shown in Figure 4 B, the appended drawing reference in figure " 1 ", " 2 ", " 3 ", " 4 ", " 5 ", " 6 " and " 7 " indicates the friendship between component Mutually sequence.Coprocessor 311 receives the signal acquired by specified sensor, and it is close to judge whether the signal has characterized barrier Electronic equipment 300 and reach in preset range (such as 1 meter) relative to electronic equipment 300.In the case where the judgment result is yes, Coprocessor 311 starts camera and handles chip 312, and camera processing chip 312 calls camera module to be clapped after starting It takes the photograph, camera handles chip 312 and obtains the second image captured by camera module.Camera handles chip 312 and executes first Second image and Given Face image are carried out characteristic matching by identification process.If matching degree does not meet the first precision, directly Determining authentication failure is connect, keeps the off working state of chipset 313 and processor 314, i.e., holding electronic equipment 300 is low Power consumption state.
If the matching degree that the first identification process obtains meets the first precision, camera handles chip 312 at association It manages device 311 and sends confirmation instruction.Coprocessor 311 sends wake up instruction after receiving confirmation instruction, to chipset 313, So that chipset 313 indicates that processor 314 carries out wake-up starting.After processor 314 carries out wake-up starting, electronic equipment 300 Power consumption improves.Then, processor 314 executes the second identification process, identifies whether above-mentioned second image is specific with the second precision Facial image, if it is, authentication success is determined, and the operation interface of output electronic equipment 300, if it is not, then determining Authentication failure does not provide the operation interface for interacting with operating system to active user.Wherein, processor 314 can be with Camera processing chip 312 is called to execute above-mentioned second identification process.
Further, in one embodiment of the present disclosure, electronic equipment 310 can also include switching circuit.Join again Examine Fig. 4 B, coprocessor 311, can be by switching circuit 315 to chipset 313 when sending wake up instruction to chipset 313 Send wake up instruction.Similarly, in the authentication procedures shown in Fig. 4 A, camera handles chip 312 to chipset 313 When sending wake up instruction, wake up instruction can be sent to chipset 313 by switching circuit 315.
Fig. 5 diagrammatically illustrates the frame of the identification authentication system according to an embodiment of the present disclosure applied to electronic equipment Figure.
As shown in figure 5, the identification authentication system 500 for being applied to electronic equipment includes: that image collection module 510, first is known Other module 520, the second identification module 530 and authentication module 540.
Image collection module 510 shoots image for being based on specific trigger signal.
Whether the first identification module 520 should be with for being Given Face image with the captured image of the first precision identification The process that first precision is identified has the first power consumption.
Second identification module 530, for the recognition result identified with the first precision be in the case where, with second Whether the captured image of precision identification is Given Face image, should have the second function with the process that the second precision is identified Consumption.
Authentication module 540, for determining that identity is recognized in the case where the recognition result identified with the second precision, which is, is It demonstrate,proves successfully.
Wherein, the second power is greater than the first power, and the second precision is higher than the first precision.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution Art problem, the function of realization and the technical effect reached respectively with the implementation of corresponding step each in method section Example Mode, the technical issues of solving, the function of realization and the technical effect that reaches are same or like, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, in image collection module 510, the first identification module 520, the second identification module 530 and authentication module 540 Any number of may be incorporated in a module is realized or any one module therein can be split into multiple modules. Alternatively, at least partly function of one or more modules in these modules can mutually be tied at least partly function of other modules It closes, and is realized in a module.In accordance with an embodiment of the present disclosure, image collection module 510, the first identification module 520, second At least one of identification module 530 and authentication module 540 can at least be implemented partly as hardware circuit, such as scene can It programs gate array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated Integrated circuit (ASIC), or can be by carrying out hardware or the firmwares such as any other rational method that is integrated or encapsulating to circuit It realizes, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined To realize.Alternatively, in image collection module 510, the first identification module 520, the second identification module 530 and authentication module 540 At least one can at least be implemented partly as computer program module, can be with when the computer program module is run Execute corresponding function.
Fig. 6 diagrammatically illustrates the electronic equipment for being adapted for carrying out method as described above according to another embodiment of the disclosure Block diagram.Electronic equipment shown in Fig. 6 is only an example, should not function to the embodiment of the present disclosure and use scope bring Any restrictions.
As shown in fig. 6, electronic equipment 600 includes processor group 610 and computer readable storage medium 620.The electronics is set Standby 600 can execute the method according to the embodiment of the present disclosure.
Specifically, processor group 610 for example may include general purpose microprocessor, instruction set processor and/or related chip Group and/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor group 610 can also include for delaying Deposit the onboard storage device of purposes.Processor group 610 can be the difference for executing the method flow according to the embodiment of the present disclosure The single treatment unit of movement either multiple processing units.
Computer readable storage medium 620, such as can be non-volatile computer readable storage medium, specific example Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 620 may include computer program 621, which may include generation Code/computer executable instructions execute processor 610 according to the embodiment of the present disclosure Method or its any deformation.
Computer program 621 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 621 may include one or more program modules, for example including 621A, module 621B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 610 When execution, processor 610 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, image collection module 510, the first identification module 520,530 and of the second identification module At least one of authentication module 540 can be implemented as the computer program module with reference to Fig. 6 description, by processor 610 When execution, data processing method described above may be implemented.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/ In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents, A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.

Claims (10)

1. a kind of identity identifying method applied to electronic equipment, comprising:
Based on specific trigger signal, image is shot;
It whether is Given Face image with the first precision identification described image, it is described to have the first power consumption with the identification of the first precision;
It whether is the spy with the second precision identification described image if the recognition result with the identification of the first precision is yes Determine facial image, it is described to have the second power consumption with the identification of the second precision;And
If the recognition result with the identification of the second precision is yes, it is determined that authentication success,
Wherein, second power is greater than first power, and second precision is higher than first precision.
2. a kind of electronic equipment, comprising: memory, processor group and storage can be run on a memory and in processor group When computer program, the processor group execute the computer program for realizing:
Based on specific trigger signal, image is shot;
It whether is Given Face image with the first precision identification described image, it is described to have the first power consumption with the identification of the first precision;
It whether is the spy with the second precision identification described image if the recognition result with the identification of the first precision is yes Determine facial image, it is described to have the second power consumption with the identification of the second precision;And
If the recognition result with the identification of the second precision is yes, it is determined that authentication success,
Wherein, second power is greater than first power, and second precision is higher than first precision.
3. electronic equipment according to claim 2, wherein the processor group includes: coprocessor and camera processing Chip;
The coprocessor for receiving the signal acquired by specified sensor, and judges whether the signal is described specific Trigger signal, if it is, starting camera handles chip;And
The camera handles chip, for calling camera module to be shot, so that camera processing chip obtains Described image.
4. electronic equipment according to claim 3, wherein the coprocessor includes at least one of following: embedded control Device processed and sensing central controller.
5. electronic equipment according to claim 3, wherein the specified sensor includes at least one of following: infrared biography Sensor and range sensor.
6. electronic equipment according to claim 3, wherein
The coprocessor, is also used to judge whether the signal is characterized in the preset range memory relative to the electronic equipment In barrier and the movement towards the electronic equipment has occurred in the barrier in the given time, if it is, determining institute Stating signal is the specific trigger signal.
7. electronic equipment according to claim 3, wherein the processor group further includes chipset and processor;
The camera handles chip, is also used to identify whether described image is Given Face image with first precision, such as Fruit is then to send wake up instruction to the chipset, so that the chipset indicates that the processor carries out wake-up starting;And
The processor, for identifying whether described image is Given Face image using the second power with the second precision, if It is, it is determined that authentication success, and export the operation interface of the electronic equipment.
8. electronic equipment according to claim 3, wherein the processor group further includes chipset and processor;
The camera handles chip, is also used to identify whether described image is Given Face image with first precision, such as Fruit is then to send confirmation instruction to the coprocessor;
The coprocessor is also used to after receiving the confirmation instruction, and Xiang Suoshu chipset sends wake up instruction, so that institute It states chipset and indicates that the processor carries out wake-up starting;And
The processor, for whether being Given Face image with second precision identification described image, if it is, determining Authentication success, and export the operation interface of the electronic equipment.
9. electronic equipment according to claim 7 or 8, wherein the processor group further includes switching circuit;
The camera handles chip, is also used to send the wake up instruction to the chipset by the switching circuit;And And/or person
The coprocessor is also used to after receiving the confirmation instruction, is sent out by the switching circuit to the chipset Send the wake up instruction.
10. electronic equipment according to claim 7 or 8, wherein the processor group is gone back when executing the computer program For realizing:
If the first precision recognition result be it is no, keep the non-wake-up states of the processor.
CN201910583475.0A 2019-06-28 2019-06-28 Identity identifying method and electronic equipment applied to electronic equipment Pending CN110298161A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910583475.0A CN110298161A (en) 2019-06-28 2019-06-28 Identity identifying method and electronic equipment applied to electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910583475.0A CN110298161A (en) 2019-06-28 2019-06-28 Identity identifying method and electronic equipment applied to electronic equipment

Publications (1)

Publication Number Publication Date
CN110298161A true CN110298161A (en) 2019-10-01

Family

ID=68029679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910583475.0A Pending CN110298161A (en) 2019-06-28 2019-06-28 Identity identifying method and electronic equipment applied to electronic equipment

Country Status (1)

Country Link
CN (1) CN110298161A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309137A (en) * 2020-02-18 2020-06-19 深圳云天励飞技术有限公司 Chip control method and device, chip and terminal equipment
CN111641718A (en) * 2020-06-01 2020-09-08 北京弘远博学科技有限公司 Method for authenticating APP identity at mobile phone terminal
CN113781969A (en) * 2021-09-27 2021-12-10 联想(北京)有限公司 Backlight adjusting method and device and electronic equipment
CN114004727A (en) * 2020-07-28 2022-02-01 Oppo广东移动通信有限公司 Co-processing chip and electronic equipment
CN114531947A (en) * 2020-08-31 2022-05-24 华为技术有限公司 Electronic device and response operation method of electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103345360B (en) * 2013-06-21 2016-02-10 广东欧珀移动通信有限公司 A kind of intelligent terminal touch screen gesture identification method
CN105844130A (en) * 2016-03-17 2016-08-10 上海与德通讯技术有限公司 Fingerprint unlocking method under standby state
CN105956579A (en) * 2016-05-27 2016-09-21 国创科视科技股份有限公司 Rapid finger vein identification method integrating fuzzy template and point characteristics
CN109388925A (en) * 2017-08-03 2019-02-26 上海聚虹光电科技有限公司 A kind of mobile device wakes up and unlocking method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103345360B (en) * 2013-06-21 2016-02-10 广东欧珀移动通信有限公司 A kind of intelligent terminal touch screen gesture identification method
CN105844130A (en) * 2016-03-17 2016-08-10 上海与德通讯技术有限公司 Fingerprint unlocking method under standby state
CN105956579A (en) * 2016-05-27 2016-09-21 国创科视科技股份有限公司 Rapid finger vein identification method integrating fuzzy template and point characteristics
CN109388925A (en) * 2017-08-03 2019-02-26 上海聚虹光电科技有限公司 A kind of mobile device wakes up and unlocking method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309137A (en) * 2020-02-18 2020-06-19 深圳云天励飞技术有限公司 Chip control method and device, chip and terminal equipment
CN111309137B (en) * 2020-02-18 2021-07-06 深圳云天励飞技术有限公司 Chip control method and device, chip and terminal equipment
CN111641718A (en) * 2020-06-01 2020-09-08 北京弘远博学科技有限公司 Method for authenticating APP identity at mobile phone terminal
CN111641718B (en) * 2020-06-01 2023-06-20 北京弘远博学科技有限公司 Mobile phone terminal APP identity authentication method
CN114004727A (en) * 2020-07-28 2022-02-01 Oppo广东移动通信有限公司 Co-processing chip and electronic equipment
CN114531947A (en) * 2020-08-31 2022-05-24 华为技术有限公司 Electronic device and response operation method of electronic device
CN113781969A (en) * 2021-09-27 2021-12-10 联想(北京)有限公司 Backlight adjusting method and device and electronic equipment
CN113781969B (en) * 2021-09-27 2024-04-23 联想(北京)有限公司 Backlight adjusting method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN110298161A (en) Identity identifying method and electronic equipment applied to electronic equipment
CN110851809B (en) Fingerprint identification method and device and touch screen terminal
CN106066986B (en) Method and apparatus for sensing a fingerprint
AU2017293746B2 (en) Electronic device and operating method thereof
US20180268121A1 (en) Method For Unlocking Screen Of Terminal Having Fingerprint Identification Sensors And Terminal
US9576121B2 (en) Electronic device and authentication system therein and method
CN110088764B (en) Operation method for iris recognition function and electronic device supporting the same
KR102488563B1 (en) Apparatus and Method for Processing Differential Beauty Effect
CN106662970B (en) Method and device for setting interruption threshold of fingerprint identifier and terminal equipment
US9594969B1 (en) Iris recognition including liveness testing
JP2015228219A (en) Electronic apparatus and fingerprint recognition method
KR102575672B1 (en) Electronic apparatus and operating method thereof
US9292753B2 (en) Parallel face detection and tracking system
EP3224757B1 (en) In-device privacy framework for smart glasses and smart watches
CN107784268B (en) Method and electronic device for measuring heart rate based on infrared sensor
CN104318147A (en) Information processing method and electronic device
CN105320867B (en) Electronic device and fingerprinting method
KR102497477B1 (en) Method for protecting personal information and electronic device thereof
EP3104304B1 (en) Electronic apparatus and method of extracting still images
EP3086245A1 (en) Method and device for sharing picture
WO2019011072A1 (en) Iris live detection method and related product
KR20150051888A (en) Method for controlling power of fingerprint sensor, fingerprint processing device, and electronic device performing thereof
CN104866816A (en) Novel image and fingerprint boot identification method of mobile phone
KR20180089226A (en) Electric device and method for controlling biological sensor
KR20140071802A (en) Shortcut information execution system and method of mobile terminal based face recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination