CN115618315A - Screen unlocking method and device, electronic equipment and storage medium - Google Patents

Screen unlocking method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115618315A
CN115618315A CN202211347776.1A CN202211347776A CN115618315A CN 115618315 A CN115618315 A CN 115618315A CN 202211347776 A CN202211347776 A CN 202211347776A CN 115618315 A CN115618315 A CN 115618315A
Authority
CN
China
Prior art keywords
user object
screen
biological information
biological
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211347776.1A
Other languages
Chinese (zh)
Inventor
闫晓琦
王健
刘天怡
王大海
王珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202211347776.1A priority Critical patent/CN115618315A/en
Publication of CN115618315A publication Critical patent/CN115618315A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides a screen unlocking method, a screen unlocking device, electronic equipment and a storage medium, wherein first biological information of a user object is obtained by detecting the user object, and the first biological information represents biological characteristics of the user object; determining a unique identity corresponding to the user object based on the first biological information; and unlocking the screen according to the unique identity of the user object. By detecting the biological information of the user object and utilizing the characteristic of high accuracy of the biological information, the identity of the user is identified to obtain the unique identity of the user object, so that unlocking is performed based on the unique identity, the security of the terminal equipment in a screen locking state is improved, the screen unlocking speed is improved, and the problems of poor convenience and low security caused by the password input process are solved.

Description

Screen unlocking method and device, electronic equipment and storage medium
Technical Field
The application relates to the technical field of intelligent terminals, in particular to a screen unlocking method and device, electronic equipment and a storage medium.
Background
Terminal equipment represented by desktop computers, notebook computers and tablet computers is very common tool equipment in current office scenes, and various service data and information need to be processed by the terminal equipment, so that the requirements of ensuring the safety and confidentiality in the data use process exist.
In the prior art, an operating system can provide a screen locking function when a terminal device is used, and after the screen is locked, a user needs to input a correct password to unlock the screen so as to continue using the terminal device, so that the requirements of operation safety and data confidentiality of the terminal device are met to a certain extent.
However, the scheme in the prior art has the problems of poor unlocking convenience, low safety and the like.
Disclosure of Invention
The application provides a screen unlocking method and device, an electronic device and a storage medium, and aims to solve the problems of poor unlocking convenience, low safety and the like of a terminal device.
In a first aspect, the present application provides a screen unlocking method, including:
detecting a user object, and acquiring first biological information of the user object, wherein the first biological information represents the biological characteristics of the user object; determining a unique identity corresponding to the user object based on the first biological information; and unlocking the screen according to the unique identity of the user object.
In a possible implementation manner, the determining, based on the first biological information, a unique identifier corresponding to the user object includes: performing feature recognition based on the first biological information to obtain a recognition result corresponding to the first biological information; acquiring second biological information of the user object based on the recognition result of the first biological information; and determining the unique identity corresponding to the user object according to the second biological information.
In one possible implementation manner, the recognition result includes a recognition confidence representing a probability that the recognized biometric feature is a target biometric feature, and the target biometric feature is a biometric feature possessed by a target user having an unlocking right of the screen; acquiring second biological information of the user object based on the identification result of the first biological information, wherein the acquisition comprises the following steps: if the recognition confidence is smaller than a first confidence threshold, controlling a feature acquisition unit to acquire a second biological feature of the user object; if the recognition confidence is greater than a first confidence threshold, generating the second biometric based on the first biometric.
In one possible implementation, the method further includes: acquiring at least one reference biometric feature of the user object, wherein the reference biometric feature is other biometric features different from the first biometric feature; identifying each reference biological characteristic to obtain an identification confidence corresponding to each reference biological characteristic, wherein the identification confidence represents the probability that the identified biological characteristic is the target biological characteristic; unlocking the screen according to the unique identity of the user object, comprising: and if the unique identity identification is a target identification and the lowest recognition confidence coefficient is greater than a second confidence coefficient threshold value, unlocking the screen, wherein the target identification is an identification corresponding to a target user with the unlocking authority of the screen, and the lowest recognition confidence coefficient is the lowest value of the recognition confidence coefficients corresponding to the reference biological features.
In a possible implementation manner, before detecting a user object and acquiring first biological information of the user object, the method further includes: detecting a first distance between the user object and the screen; and when the first distance is greater than a first distance threshold value, locking the screen.
In a possible implementation manner, after the screen is locked, the method further includes: acquiring, by an image acquisition unit, a first image containing the user object; identifying the first image and determining the moving position of the user object; if the moving position of the user object exceeds the target area, setting the trust state to be a first state; if the moving position of the user object does not exceed the target area, setting the trust state to be a second state; the detecting a user object and acquiring first biological information of the user object include: when the user object is detected, if the trust state is a first state, controlling a feature acquisition unit to acquire biological features of the user object to generate first biological information; and if the trust state is the second state, reading a preset target biological characteristic, and generating first biological information based on the target biological characteristic, wherein the target biological characteristic is a biological characteristic of a target user with the unlocking authority of the screen.
In one possible implementation, the biometric features include at least one of: fingerprint features, voiceprint features, retinal features, facial features.
In a second aspect, the present application provides a screen unlocking device, including:
the detection module is used for detecting a user object and acquiring first biological information of the user object, wherein the first biological information represents the biological characteristics of the user object;
the determining module is used for determining a unique identity corresponding to the user object based on the first biological information;
and the unlocking module is used for unlocking the screen according to the unique identity of the user object.
In a possible implementation manner, the determining module is specifically configured to: performing feature recognition based on the first biological information to obtain a recognition result corresponding to the first biological information; acquiring second biological information of the user object based on the identification result of the first biological information; and determining the unique identity corresponding to the user object according to the second biological information.
In one possible implementation, the recognition result includes a recognition confidence representing a probability that the recognized biometric characteristic is a target biometric characteristic, and the target biometric characteristic is a biometric characteristic possessed by a target user having the unlocking authority of the screen; the determining module, when acquiring second biological information of the user object based on the recognition result of the first biological information, is specifically configured to: if the recognition confidence is smaller than a first confidence threshold, controlling a feature acquisition unit to acquire a second biological feature of the user object; if the recognition confidence is greater than a first confidence threshold, generating the second biometric based on the first biometric.
In a possible implementation manner, the detection module is further configured to: acquiring at least one reference biological characteristic of the user object, wherein the reference biological characteristic is other biological characteristics different from the first biological characteristic; identifying each reference biological characteristic to obtain an identification confidence corresponding to each reference biological characteristic, wherein the identification confidence represents the probability that the identified biological characteristic is the target biological characteristic; the unlocking module is specifically configured to: and if the unique identity identification is a target identification and the lowest recognition confidence coefficient is greater than a second confidence coefficient threshold value, unlocking the screen, wherein the target identification is an identification corresponding to a target user with the unlocking authority of the screen, and the lowest recognition confidence coefficient is the lowest value of the recognition confidence coefficients corresponding to the reference biological features.
In a possible implementation manner, before detecting a user object and acquiring first biological information of the user object, the detection module is further configured to: detecting a first distance between the user object and the screen; and when the first distance is greater than a first distance threshold value, locking the screen.
In a possible implementation manner, after the screen is locked, the detection module is further configured to: acquiring, by an image acquisition unit, a first image containing the user object; identifying the first image, and determining the moving position of the user object; if the moving position of the user object exceeds the target area, setting the trust state to be a first state; if the moving position of the user object does not exceed the target area, setting the trust state to be a second state; the determining module is specifically configured to: when the user object is detected, if the trust state is a first state, controlling a feature acquisition unit to acquire biological features of the user object to generate first biological information; and if the trust state is the second state, reading a preset target biological characteristic, and generating first biological information based on the target biological characteristic, wherein the target biological characteristic is a biological characteristic of a target user with the unlocking authority of the screen.
In one possible implementation, the biometric features include at least one of: fingerprint features, voiceprint features, retinal features, facial features.
In a third aspect, the present application provides an electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer execution instructions;
the processor executes computer-executable instructions stored in the memory to implement the screen unlocking method according to any one of the first aspect of the embodiments of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when executed by a processor, the computer-executable instructions are used to implement the screen unlocking method according to any one of the first aspect of the embodiments of the present application.
According to a fifth aspect of embodiments herein, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the screen unlocking method as described in any one of the first aspects above.
According to the screen unlocking method, the screen unlocking device, the electronic equipment and the storage medium, the first biological information of the user object is obtained by detecting the user object, and the first biological information represents the biological characteristics of the user object; determining a unique identity corresponding to the user object based on the first biological information; and unlocking the screen according to the unique identity of the user object. The method has the advantages that the biological information of the user object is detected, the identity of the user is identified by utilizing the characteristic of high accuracy of the biological information, the unique identity of the user object is obtained, unlocking is carried out based on the unique identity, the safety of the terminal equipment in a screen locking state is improved, the screen unlocking speed is improved, and the problems of poor convenience and low safety caused by the password input process are solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is an application scene diagram of a screen unlocking method provided in an embodiment of the present application;
FIG. 2 is a flowchart of a screen unlocking method according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a specific implementation manner of step S102 in the embodiment shown in FIG. 2;
fig. 4 is a flowchart of a screen unlocking method according to another embodiment of the present application;
FIG. 5 is a schematic view of a target area provided by an embodiment of the present disclosure;
FIG. 6 is a flowchart illustrating a specific implementation manner of step S210 in the embodiment shown in FIG. 4;
fig. 7 is a schematic structural diagram of a screen unlocking device according to an embodiment of the present application;
FIG. 8 is a schematic view of an electronic device provided by an embodiment of the present application;
fig. 9 is a block diagram of a terminal device according to an exemplary embodiment of the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. The drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the concepts of the application by those skilled in the art with reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
In the technical scheme of the application, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the personal information and the financial data of the related user are all in accordance with the regulations of related laws and regulations and do not violate the good customs of the public order.
The following explains an application scenario of the embodiment of the present application:
fig. 1 is an application scene diagram of a screen unlocking method provided in the embodiment of the present application, where the screen unlocking method provided in the embodiment of the present application may be applied in an application scene of automatic locking and unlocking of a terminal device in an office environment, for example, an execution main body of the method provided in the embodiment of the present application may be a terminal device or a server, taking the terminal device as an example, and the terminal device is, for example, a notebook computer, as shown in fig. 1, when a user uses the notebook computer, a screen of the notebook computer is in an unlocked state in which the notebook computer normally works; when a user needs to leave a working position (the user is located at the position A), the terminal equipment can lock the screen of the terminal equipment based on automatic trigger logic, so that the screen of the terminal equipment is in a locked state, and the terminal equipment cannot be operated and used before being unlocked, thereby ensuring the operation safety and data safety of the terminal equipment; when the user returns to the working position (the user is located at position B), the terminal device may perform user object identification based on the method provided in this embodiment, and after confirming that the user object has the unlocking authority, automatically perform screen unlocking, so that the screen of the terminal device returns to the unlocked state.
At present, among the prior art, terminal equipment is in the use, and operating system can provide the lock screen function, and after the lock screen, need the user to input correct password and carry out the screen unblock and just can continue to use to the operation security and the data security's of terminal equipment requirement has been satisfied to a certain extent. However, in the scheme in the prior art, due to the fact that the password is complicated, and the password needs to be manually input in the screen unlocking process, the password input process is complicated and time-consuming, and potential safety hazards such as password leakage or password safety are caused, so that the screen unlocking process is poor in convenience and safety, and the like.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a screen unlocking method according to an embodiment of the present application, and as shown in fig. 2, the screen unlocking method according to the embodiment includes the following steps:
step S101, detecting a user object, and acquiring first biological information of the user object, wherein the first biological information represents biological characteristics of the user object.
For example, the main body for executing the method provided by this embodiment may be a non-mobile terminal device, such as a desktop computer. The terminal device is provided with (connected with) a feature acquisition unit for acquiring features of a user of the terminal device from one or more feature dimensions, and more specifically, the feature acquisition unit includes, for example: an image acquisition unit, a fingerprint acquisition unit and the like. The user object is detected through the feature acquisition unit, and first biological information corresponding to the type of the feature acquisition unit and representing the biological features of the user object is obtained. Illustratively, the biometric characteristic includes at least one of: fingerprint features, voiceprint features, retinal features, facial features. The first biological information is information representing the biological characteristics, such as a feature map, a pixel map, a feature matrix, and the like corresponding to the biological characteristics, and a specific implementation manner may be set as needed, which is not described herein again.
Further, the terminal device is also provided with (connected to) a detection unit for detecting a surrounding user object, such as a distance sensor, a camera, and the like. Detecting the surrounding environment through a detection unit so as to detect the user object, for example, when a distance sensor detects that the distance between an object and the distance sensor is smaller than a threshold value, determining that the user object is detected; for another example, an image of an operation area near the terminal device is captured by an image sensor, the image is recognized, and if a user is recognized, it is determined that a user object is detected.
Step S102, based on the first biological information, determining a unique identity corresponding to the user object.
After obtaining the first biological information, comparing the first biological information based on a preset biological information database to obtain a unique identifier corresponding to the first biological information, where the unique identifier corresponds to a unique user subject and is used to characterize identity information of the user subject, and the unique identifier is, for example: a unique user identification code, a user number, a user name, etc. In a possible implementation manner, after the biological information database is retrieved based on the first biological information, the matched unique identifier may be obtained, and in this case, the obtained unique identifier is a valid value, for example, a specific number. In yet another possible implementation manner, after the biometric information database is retrieved based on the first biometric information, the matched unique identifier cannot be obtained, in this case, the obtained unique identifier is an invalid value, for example, a specific identifier (for example, NULL), and then, based on the specific content of the unique identifier, the screen unlocking determination is performed.
In one possible implementation manner, as shown in fig. 3, a specific implementation manner of step S102 includes:
step S1021: and performing feature recognition based on the first biological information to obtain a recognition result corresponding to the first biological information.
Step S1022: second biological information of the user object is acquired based on the recognition result of the first biological information.
Step S1023: and determining the unique identity corresponding to the user object according to the second biological information.
Illustratively, first, through a pre-trained feature recognition model, feature recognition is performed on first biological information acquired through a feature acquisition unit, so as to obtain a recognition result output by the feature recognition model, where the recognition result includes a recognition confidence, and the recognition confidence represents a probability that a recognized biological feature is a biological feature of a certain user pre-stored in a system.
For example, the recognition result is { T1:0.8; t2 is 0.1; t3:0.04}:
the recognition result is a group of structural bodies and comprises 3 groups of key value pairs, wherein T1:0.8 represents that the first biological information is the recognition confidence coefficient of the biological characteristics of the user T1 and is 0.8 (normalized value); t2:0.1 represents that the first biological information is the recognition confidence coefficient of the biological characteristics of the user T2 is 0.1 (normalized value); t3:0.05 the recognition confidence that the first biometric information is the biometric feature that the user T3 has is 0.05 (normalized value). Based on the recognition result, the recognition confidence degrees, i.e., probabilities, of the biometric features (T1, T2, T3) of the different users whose first biometric information is pre-stored in the system can be obtained, and then the biometric feature corresponding to the maximum recognition confidence degree is determined as the target biometric feature, and the recognition confidence degree corresponding to the target biometric feature, e.g., the biometric feature of the user T1 in the above example, is determined as the target biometric feature because the corresponding recognition confidence degree is 0.8, which is the maximum.
Further, the higher the recognition confidence corresponding to the target biological feature in the recognition result is, the more accurate the result of recognizing the first biological information is, the higher the accuracy is, so that the situation-based processing is performed according to the recognition confidence, the second biological information is continuously acquired, and the corresponding unique identity is obtained according to the second biological information, thereby improving the recognition accuracy and the safety.
In a possible implementation manner, the specific implementation step of step S1022 includes:
step S1022A: and if the recognition confidence coefficient is smaller than the first confidence coefficient threshold value, controlling the feature acquisition unit to acquire a second biological feature of the user object.
Step S1022B: if the recognition confidence is greater than the first confidence threshold, a second biometric is generated based on the first biometric.
Exemplarily, after obtaining the recognition confidence corresponding to the target biological feature, on one hand, if the recognition confidence is smaller than a first confidence threshold, which indicates that the recognition confidence is too low at this time, the feature acquisition unit of the terminal device is controlled to further acquire a second biological feature, for example, the first biological feature is a facial feature, and the second biological feature is a fingerprint feature; in the subsequent steps, the identification is further carried out based on the second biological characteristics, and a corresponding unique identity is generated, so that the safety is improved; on the other hand, if the recognition confidence is greater than the first confidence threshold, it is indicated that the recognition confidence is sufficiently high at this time and can be trusted, so that the second biometric is generated directly based on the first biometric, specifically, for example, the first biometric is directly assigned to the second biometric, so that in the subsequent steps, the unique identity corresponding to the first biometric is directly obtained, and while the security is ensured, the calculation amount of the terminal device is reduced, and the time consumed for unlocking the screen is reduced. In the embodiment, whether the second biological characteristics need to be acquired is further judged through the identification confidence corresponding to the first biological characteristics, and the second biological characteristics are further acquired to determine the unique identity under the condition of insufficient identification confidence, so that the safety is improved; and under the condition that the recognition confidence is sufficient, the corresponding unique identity is directly obtained based on the first biological characteristics (converted into the second biological characteristics), the calculated amount and the time consumption for unlocking the screen are reduced, and the unlocking instantaneity is improved.
And step S103, unlocking the screen according to the unique identity of the user object.
Illustratively, after obtaining the unique identifier of the user object, the unique identifier is compared with the unique identifier of the target user, and the target user is a user having the unlocking right of the screen. And if the two are consistent, unlocking, otherwise, refusing to unlock. The whole process does not need the operation process of typing the password by the user, so that the password security of the unlocking process can be ensured, the problem of password leakage is avoided, the unlocking efficiency is improved, and the time consumption is reduced.
In the embodiment, first biological information of a user object is obtained by detecting the user object, and the first biological information represents biological characteristics of the user object; determining a unique identity corresponding to the user object based on the first biological information; and unlocking the screen according to the unique identity of the user object. By detecting the biological information of the user object and utilizing the characteristic of high accuracy of the biological information, the identity of the user is identified to obtain the unique identity of the user object, so that unlocking is performed based on the unique identity, the security of the terminal equipment in a screen locking state is improved, the screen unlocking speed is improved, and the problems of poor convenience and low security caused by the password input process are solved.
Fig. 4 is a flowchart of a screen unlocking method provided in another embodiment of the present application, and as shown in fig. 4, the screen unlocking method provided in this embodiment further details step S102 on the basis of the screen unlocking method provided in the embodiment shown in fig. 2, and adds related steps of screen locking, so that the screen unlocking method provided in this embodiment includes the following steps:
in step S201, a first distance between a user object and a screen is detected.
And step S202, when the first distance is larger than a first distance threshold value, locking the screen.
For example, the screen unlocking method provided by this embodiment may be applied to an application scenario in which a user leaves a terminal device for a short time, for example, after the user operating the terminal device leaves a workstation, a planar screen of the terminal device is automatically locked, and after the user (the same or a user with an unlocking right) returns to the workstation, the terminal device automatically performs planar unlocking.
Illustratively, first, the terminal device detects a distance between the user and a plane of the terminal device, i.e., a first distance, by the detection unit. The specific implementation of the detecting unit can refer to the specific description in the embodiment shown in fig. 2, and is not described herein again. And judging whether the user object leaves the station or not by comparing the first distance with a first distance threshold, and locking the screen after judging that the user object leaves the station.
Step S203, a first image containing the user object is acquired by the image acquisition unit.
Step S204, the first image is identified, and the moving position of the user object is determined.
Step S205, if the mobile position of the user object exceeds the target area, setting the trust state to be a first state; and if the moving position of the user object does not exceed the target area, setting the trust state to be in a second state.
Further, after the screen is locked, the user object continues to be detected through the image acquisition unit, and a first image containing the user object is acquired. The image acquisition unit may be a device disposed in the terminal device, such as a camera module; the terminal device may be a device installed outside the terminal device and communicatively connected to the terminal device by a wired or wireless method, for example, a video monitor installed indoors, an external camera connected to the terminal device, and the like. Then, the collected first image is identified, the position, namely the moving position, of the user object after leaving the station is determined, then whether the user moves the image collecting area of the image collecting unit is judged based on the comparison between the moving position and the target area, if the user object does not move the image collecting area of the image collecting unit, namely the user object is always under the monitoring of the image collecting unit, the user object can be determined to be the target user who operates the terminal equipment before, therefore, after the user object returns to the station again, the step of collecting the first biological information can be skipped, and the screen unlocking speed is improved.
Exemplarily, fig. 5 is a schematic diagram of a target area provided in the embodiment of the present disclosure, as shown in fig. 5, by acquiring a first image corresponding to a user object, and performing identification, when it is identified that the user object moves to a position a, the position a is located in the target area, at this time, the terminal device sets a preset trust state to a second state, which represents that the user is not far away from the terminal device, so that the user object can be ensured to be the same person who previously operates the terminal device; when the user object is identified to move to the position B, the position B is located outside the target area, at the moment, the terminal equipment sets a preset trust state to be a first state, the representation that the user is far away from the terminal equipment is carried out, and the user object cannot be guaranteed to be the same person who operates the terminal equipment before.
In another possible implementation manner, the target area is an image capturing area of the image capturing unit, that is, when the user object leaves the image capturing area of the first image (the user object does not appear in the first image), the trust state is set to the first state; otherwise, when the user object does not leave the image acquisition area of the first image (the user object appears in the first image), the trust state is set to the second state, and the specific implementation process is similar to that in the above embodiment and is not described again.
Step S206, when the user object is detected, if the trust state is the first state, the feature acquisition unit is controlled to perform biological feature acquisition on the user object to generate first biological information.
Step S207, when the user object is detected, if the trust status is the second status, reading a preset target biometric feature, and generating first biometric information based on the target biometric feature, where the target biometric feature is a biometric feature of a target user having an unlocking right of the screen.
Further, according to different trust states, when the trust state is a second state, the user object is still in the image acquisition range of the image acquisition unit, namely, still in a 'trusted' state, at the moment, the preset target biological characteristics are directly read, the target biological characteristics of the target user are provided, and corresponding first biological information is generated based on the target biological characteristics without an actual biological characteristic acquisition process; when the trust state is the first state, it indicates that the user object is beyond the trusted image acquisition range of the image acquisition unit and is therefore in an "untrusted" state, at this time, the feature acquisition unit needs to be controlled to perform biometric acquisition on the user object to generate the first biometric information, and the specific implementation process may refer to the corresponding description of step S101 in the embodiment shown in fig. 2, which is not described herein again.
In the embodiment, the user object is subjected to image acquisition through the image acquisition unit, the user object is positioned through the obtained first image, the trust state corresponding to the user object is set according to the moving position, and when the user leaves the terminal equipment for a short time and returns, an independent biological feature acquisition link is not required to be carried out again under the condition of ensuring safety in combination with the previous step of automatically locking the screen, so that the unlocking efficiency of the screen is improved, and the time consumption for unlocking and the power consumption for calculation are reduced.
And step S208, determining the unique identity corresponding to the user object according to the first biological information.
Step S209 is to acquire a reference biometric characteristic of at least one user object, where the reference biometric characteristic is a biometric characteristic different from the first biometric characteristic.
And step S210, unlocking the screen according to the unique identity and the reference biological characteristics.
Further, in this embodiment, because the unique identifier is obtained by performing feature identification based on the first biological information and sorting the obtained identification confidences according to the obtained identification confidence (the specific implementation manner may be described in the related steps in the embodiment shown in fig. 2, and is not described again), when there is a group of high-similarity forged biological features, even if the matching degree of other biological features is low, the purpose of obtaining the unique identifier corresponding to the target user can be achieved, so that a certain potential safety hazard exists. In order to solve the problem, in this embodiment, after the first biometric information is collected and the unique identity is determined, at least one other biometric characteristic different from the first biometric characteristic, that is, a reference biometric characteristic, is collected, the unique identity is verified by combining the reference biometric characteristic, and after the unique identity passes the verification, the screen is unlocked, so that the problem that the biometric characteristic is forged to unlock the screen is solved, and the screen unlocking safety is further improved.
Illustratively, as shown in fig. 6, the step S210 includes:
step S2101: and identifying each reference biological characteristic to obtain an identification confidence corresponding to each reference biological characteristic, wherein the identification confidence represents the probability that the identified biological characteristic is the target biological characteristic.
Step S2102: and if the unique identity identification is a target identification and the lowest recognition confidence coefficient is greater than a second confidence coefficient threshold value, unlocking the screen, wherein the target identification is an identification corresponding to a target user with the unlocking authority of the screen, and the lowest recognition confidence coefficient is the lowest value of the recognition confidence coefficients corresponding to the reference biological features.
In this embodiment, by identifying each reference biometric feature and obtaining a recognition confidence of each reference biometric feature (see a specific obtaining method of the recognition confidence, which may be referred to as an obtaining method of the recognition confidence corresponding to the first biometric feature in the embodiment shown in fig. 2), when it is determined that the unique identity is the target identity, the lowest value of the recognition confidence corresponding to each reference biometric feature is further detected, and after it is determined that the lowest recognition confidence is greater than a second confidence threshold (for example, 0.8), the screen is unlocked, so that a problem that the screen can be unlocked by forging a single biometric feature is avoided, and security in an unlocking process of the screen is improved.
Fig. 7 is a schematic structural diagram of a screen unlocking device according to an embodiment of the present application, and as shown in fig. 7, a screen unlocking device 3 according to the embodiment includes:
the detection module 31 is configured to detect a user object, and acquire first biological information of the user object, where the first biological information represents a biological feature of the user object;
the determining module 32 is configured to determine, based on the first biological information, a unique identity corresponding to the user object;
and the unlocking module 33 is used for unlocking the screen according to the unique identity of the user object.
In a possible implementation manner, the determining module 32 is specifically configured to: performing feature recognition based on the first biological information to obtain a recognition result corresponding to the first biological information; acquiring second biological information of the user object based on the identification result of the first biological information; and determining the unique identity corresponding to the user object according to the second biological information.
In one possible implementation manner, the recognition result includes a recognition confidence representing a probability that the recognized biometric feature is the target biometric feature, and the target biometric feature is a biometric feature that a target user having an unlocking right of the screen has; the determining module 32, when acquiring the second biological information of the user object based on the recognition result of the first biological information, is specifically configured to: if the recognition confidence coefficient is smaller than the first confidence coefficient threshold value, controlling a feature acquisition unit to acquire a second biological feature of the user object; if the recognition confidence is greater than the first confidence threshold, a second biometric is generated based on the first biometric.
In a possible implementation manner, the detection module 31 is further configured to: acquiring a reference biological characteristic of at least one user object, wherein the reference biological characteristic is other biological characteristics different from the first biological characteristic; identifying each reference biological characteristic to obtain an identification confidence corresponding to each reference biological characteristic, wherein the identification confidence represents the probability that the identified biological characteristic is the target biological characteristic; the unlocking module 33 is specifically configured to: and if the unique identity identification is a target identification and the lowest recognition confidence coefficient is greater than a second confidence coefficient threshold value, unlocking the screen, wherein the target identification is an identification corresponding to a target user with the unlocking authority of the screen, and the lowest recognition confidence coefficient is the lowest value of the recognition confidence coefficients corresponding to the reference biological features.
In a possible implementation manner, before detecting the user object and acquiring the first biological information of the user object, the detecting module 31 is further configured to: detecting a first distance between a user object and a screen; and when the first distance is greater than the first distance threshold value, locking the screen.
In a possible implementation manner, after the screen is locked, the detection module 31 is further configured to: acquiring a first image containing a user object by an image acquisition unit; identifying the first image and determining the moving position of the user object; if the moving position of the user object exceeds the target area, setting the trust state to be a first state; if the moving position of the user object does not exceed the target area, setting the trust state to be a second state; the determining module 32 is specifically configured to: when a user object is detected, if the trust state is a first state, controlling a feature acquisition unit to acquire biological features of the user object to generate first biological information; and if the trust state is the second state, reading a preset target biological characteristic, and generating first biological information based on the target biological characteristic, wherein the target biological characteristic is a biological characteristic of a target user with the unlocking authority of the screen.
Wherein, the detection module 31, the determination module 32 and the unlocking module 33 are connected in sequence. The screen unlocking device 3 provided in this embodiment may implement the technical solution of the method embodiment shown in any one of fig. 2 to 6, and the implementation principle and the technical effect are similar, and are not described herein again.
Fig. 8 is a schematic diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 8, an electronic device 4 according to the embodiment includes: a processor 41, and a memory 42 communicatively coupled to the processor 41.
Wherein the memory 42 stores computer-executable instructions;
the processor 41 executes computer-executable instructions stored in the memory 42 to implement the screen unlocking method provided in any one of the embodiments corresponding to fig. 2 to 6 of the present application.
The memory 42 and the processor 41 are connected by a bus 43.
The relevant descriptions and effects corresponding to the steps in the embodiments corresponding to fig. 2 to fig. 6 can be understood, and are not described in detail herein.
One embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the screen unlocking method provided in any one of the embodiments corresponding to fig. 2 to fig. 6 of the present application.
The computer readable storage medium may be, among others, ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
An embodiment of the present application provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the computer program implements the screen unlocking method provided in any embodiment corresponding to fig. 2 to fig. 6 of the present application.
Fig. 9 is a block diagram of a terminal device 800, which may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc., according to an exemplary embodiment of the present application.
Terminal device 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the terminal device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the terminal device 800. Examples of such data include instructions for any application or method operating on terminal device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of terminal device 800. Power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for terminal device 800.
The multimedia component 808 includes a screen providing an output interface between the terminal device 800 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. When the terminal device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive an external audio signal when the terminal device 800 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Sensor component 814 includes one or more sensors for providing various aspects of state assessment for terminal device 800. For example, sensor assembly 814 can detect an open/closed state of terminal device 800, the relative positioning of components, such as a display and keypad of terminal device 800, sensor assembly 814 can also detect a change in position of terminal device 800 or a component of terminal device 800, the presence or absence of user contact with terminal device 800, orientation or acceleration/deceleration of terminal device 800, and a change in temperature of terminal device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
Communication component 816 is configured to facilitate communications between terminal device 800 and other devices in a wired or wireless manner. The terminal device 800 may access a wireless network based on a communication standard, such as WiFi,3G, 4G, 5G, or other standard communication networks, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, communications component 816 further includes a Near Field Communications (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the methods provided by any of the embodiments of fig. 2-6 of the present application.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the terminal device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
An embodiment of the present application further provides a non-transitory computer-readable storage medium, where instructions in the storage medium, when executed by a processor of a terminal device, enable the terminal device 800 to perform the method provided in any one of the embodiments corresponding to fig. 2 to fig. 6 of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A method for unlocking a screen, the method comprising:
detecting a user object, and acquiring first biological information of the user object, wherein the first biological information represents the biological characteristics of the user object;
determining a unique identity corresponding to the user object based on the first biological information;
and unlocking the screen according to the unique identity of the user object.
2. The method of claim 1, wherein determining the unique identity corresponding to the user object based on the first biological information comprises:
performing feature recognition based on the first biological information to obtain a recognition result corresponding to the first biological information;
acquiring second biological information of the user object based on the identification result of the first biological information;
and determining the unique identity corresponding to the user object according to the second biological information.
3. The method of claim 2, wherein the recognition result comprises a recognition confidence representing a probability that the recognized biometric is a target biometric that a target user having unlocking authority of the screen has;
acquiring second biological information of the user object based on the identification result of the first biological information, wherein the acquisition comprises the following steps:
if the recognition confidence is smaller than a first confidence threshold, controlling a feature acquisition unit to acquire a second biological feature of the user object;
if the recognition confidence is greater than a first confidence threshold, generating the second biometric based on the first biometric.
4. The method of claim 1, further comprising:
acquiring at least one reference biometric feature of the user object, wherein the reference biometric feature is other biometric features different from the first biometric feature;
identifying each reference biological characteristic to obtain an identification confidence corresponding to each reference biological characteristic, wherein the identification confidence represents the probability that the identified biological characteristic is the target biological characteristic;
unlocking the screen according to the unique identity of the user object, comprising:
and if the unique identity identification is a target identification and the lowest recognition confidence coefficient is greater than a second confidence coefficient threshold value, unlocking the screen, wherein the target identification is an identification corresponding to a target user with the unlocking authority of the screen, and the lowest recognition confidence coefficient is the lowest value of the recognition confidence coefficients corresponding to the reference biological features.
5. The method of claim 1, further comprising, prior to detecting a user subject and obtaining first biological information of the user subject:
detecting a first distance between the user object and the screen;
and when the first distance is greater than a first distance threshold value, locking the screen.
6. The method of claim 5, further comprising, after locking the screen:
acquiring, by an image acquisition unit, a first image containing the user object;
identifying the first image and determining the moving position of the user object;
if the moving position of the user object exceeds the target area, setting the trust state to be a first state; if the moving position of the user object does not exceed the target area, setting the trust state to be a second state;
the detecting a user object and acquiring first biological information of the user object include:
when the user object is detected, if the trust state is a first state, controlling a feature acquisition unit to acquire biological features of the user object to generate first biological information;
and if the trust state is the second state, reading a preset target biological characteristic, and generating first biological information based on the target biological characteristic, wherein the target biological characteristic is a biological characteristic of a target user with the unlocking authority of the screen.
7. The method of any one of claims 1-6, wherein the biometric features include at least one of:
fingerprint features, voiceprint features, retinal features, facial features.
8. A screen unlocking apparatus, comprising:
the detection module is used for detecting a user object and acquiring first biological information of the user object, wherein the first biological information represents the biological characteristics of the user object;
the determining module is used for determining a unique identity corresponding to the user object based on the first biological information;
and the unlocking module is used for unlocking the screen according to the unique identity of the user object.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored by the memory to implement the screen unlocking method of any one of claims 1 to 7.
10. A computer-readable storage medium having stored therein computer-executable instructions for implementing the screen unlocking method according to any one of claims 1 to 7 when executed by a processor.
CN202211347776.1A 2022-10-31 2022-10-31 Screen unlocking method and device, electronic equipment and storage medium Pending CN115618315A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211347776.1A CN115618315A (en) 2022-10-31 2022-10-31 Screen unlocking method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211347776.1A CN115618315A (en) 2022-10-31 2022-10-31 Screen unlocking method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115618315A true CN115618315A (en) 2023-01-17

Family

ID=84876724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211347776.1A Pending CN115618315A (en) 2022-10-31 2022-10-31 Screen unlocking method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115618315A (en)

Similar Documents

Publication Publication Date Title
US20170053149A1 (en) Method and apparatus for fingerprint identification
EP3279822B1 (en) Identity verification method and device
CN104852966A (en) Numerical value transfer method, terminal and cloud server
CN104008348A (en) Application program control method, application program control device and terminal
CN109599104B (en) Multi-beam selection method and device
CN106097494A (en) The method for unlocking of smart lock and device
US10515224B2 (en) Method, device and storage medium for printing information
CN104850827A (en) Fingerprint identification method and apparatus
JP7482326B2 (en) Identity authentication method and device, electronic device, and storage medium
CN106980836B (en) Identity verification method and device
CN106716429A (en) Monitoring method and device, and electronic equipment
CN112270288A (en) Living body identification method, access control device control method, living body identification device, access control device and electronic device
CN114648796A (en) User identification method, device, storage medium and electronic equipment
CN107145771B (en) Application program unlocking method and device and terminal
US10263925B2 (en) Method, device and medium for sending message
CN107580142B (en) Method and device for executing processing
CN110969067A (en) User registration and authentication method and device
CN111797746A (en) Face recognition method and device and computer readable storage medium
CN111651627A (en) Data processing method and device, electronic equipment and storage medium
CN116630074A (en) Invoice reimbursement method, invoice reimbursement device, electronic equipment and storage medium
EP3236377B1 (en) Method, device and system for preventing account from being broken into
CN112351131B (en) Control method and device of electronic equipment, electronic equipment and storage medium
CN115618315A (en) Screen unlocking method and device, electronic equipment and storage medium
CN110708427B (en) Information processing method, device and storage medium
CN113408447A (en) Fingerprint identification method, fingerprint identification device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination