CN117240471A - Terminal function operation method and device, electronic equipment and storage medium - Google Patents

Terminal function operation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117240471A
CN117240471A CN202311234921.XA CN202311234921A CN117240471A CN 117240471 A CN117240471 A CN 117240471A CN 202311234921 A CN202311234921 A CN 202311234921A CN 117240471 A CN117240471 A CN 117240471A
Authority
CN
China
Prior art keywords
identification information
fingerprint
teller
data
iris
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311234921.XA
Other languages
Chinese (zh)
Inventor
贾璇
延洪胜
李宇霞
赵硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311234921.XA priority Critical patent/CN117240471A/en
Publication of CN117240471A publication Critical patent/CN117240471A/en
Pending legal-status Critical Current

Links

Abstract

The application provides a terminal function operation method, a terminal function operation device, electronic equipment and a storage medium, which can be used in the distributed field. The method comprises the following steps: acquiring first identification information, wherein the first identification information characterizes fingerprint characteristics of a user; verifying the first identification information according to preset first teller data to obtain a first verification result; acquiring second teller data according to the first verification result, wherein the second teller data represents iris characteristics of a user; and acquiring second identification information, verifying the second identification information based on second teller data, and executing the target function after verification is passed. On the basis of acquiring first identification information to perform fingerprint verification to obtain a first verification result, iris verification is performed on second identification information by acquiring second teller data corresponding to the first verification result, so that the execution target function is realized, a business system is logged in, and the problem of low security of the business system caused by the risk of losing and revealing a text password is avoided.

Description

Terminal function operation method and device, electronic equipment and storage medium
Technical Field
The present application relates to the distributed field, and in particular, to a method and apparatus for operating a terminal function, an electronic device, and a storage medium.
Background
The system used by the bank staff can be adjusted according to the actual business, and the bank staff can log in the business system matched with the teller number by inputting the teller number and the corresponding password.
In the prior art, a service system matched with a teller number is realized by setting a text password, and unauthorized teller login and illegal teller login are avoided by adding the text password to the teller number.
However, the text password still has the risk of losing and revealing, which further causes the problem of low security of the service system.
Disclosure of Invention
The application provides a terminal function operation method, a terminal function operation device, electronic equipment and a storage medium, which are used for solving the problem of low security of a service system.
In a first aspect, the present application provides a terminal function operation method, including: acquiring first identification information, wherein the first identification information characterizes fingerprint characteristics of a user; verifying the first identification information according to first teller data preset in target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment; acquiring second teller data from an authorization server corresponding to the target terminal equipment according to the first verification result, wherein the second teller data represents iris characteristics of a user with operation authority to the target terminal equipment; and acquiring second identification information, verifying the second identification information based on the second teller data, and executing a target function after verification is passed, wherein the second identification information characterizes iris characteristics of the user.
In one possible implementation, the first verification result includes a confidence coefficient that characterizes a similarity of a fingerprint feature corresponding to the first identification information and a fingerprint feature corresponding to the first teller data; and acquiring second teller data from an authorization server corresponding to the target terminal device according to the first verification result, wherein the second teller data comprises: obtaining corresponding iris characteristic information according to the confidence coefficient, wherein the iris characteristic information characterizes the characteristic scale of the iris characteristic corresponding to the second teller data; and acquiring corresponding second teller data from the authorization server according to the iris characteristic information.
In one possible implementation, the second teller data includes an iris image, and the obtaining, from the authorization server, the corresponding second teller data according to the iris feature information includes: determining a first resolution according to the iris characteristic information, wherein the first resolution characterizes the resolution of the iris image; based on the first resolution, a data request is sent to the authorization server to obtain an iris image having a target resolution that matches the iris feature information.
In a possible implementation manner, the target terminal device is provided with an image acquisition unit, and the acquiring the second identification information includes: determining a second resolution according to the first verification result, wherein the second resolution represents the image resolution of the face image acquired by the image acquisition unit; the image acquisition unit acquires images based on the second resolution to obtain a target face image; and carrying out feature recognition according to the target face image to obtain the second recognition information.
In one possible implementation manner, the verifying the first identification information according to the first teller data preset in the target terminal device to obtain a first verification result includes: determining a fingerprint acquisition area according to the first identification information, wherein the fingerprint acquisition area represents the size of an area where the fingerprint acquisition unit acquires the fingerprint; and determining the first verification result according to the first identification information, the first teller data and the fingerprint acquisition area.
In one possible implementation manner, the acquiring the first identification information includes: acquiring a fingerprint image; obtaining finger action information according to the fingerprint image, wherein the finger action information characterizes the pressing characteristics of the finger when the fingerprint image information is acquired; and determining the first identification information according to the finger action information.
In one possible implementation manner, the fingerprint image includes at least two sub-images, and the obtaining finger action information according to the fingerprint image includes: acquiring a pressing area corresponding to the sub-image; determining a pressing sequence according to the pressing areas corresponding to at least two sub-images, wherein the pressing sequence represents the pressed sequence of the pressing areas corresponding to the sub-images; determining the finger action information according to the pressing sequence
In one possible implementation manner, the fingerprint image includes a timestamp, and the obtaining finger action information according to the fingerprint image further includes: determining the pressing times of the finger according to the time stamp; and determining the finger action information according to the pressing times of the finger, wherein the pressing times are at least one time.
In one possible implementation manner, the determining the finger action information according to the pressing times of the finger includes: and determining the finger action information according to a first time interval between adjacent pressing actions, wherein the first time interval is smaller than or equal to a specified time interval.
In one possible implementation manner, the first identification information includes at least one third identification information, and the verifying the first identification information according to first teller data preset in the target terminal device, to obtain a first verification result includes: verifying at least one piece of third identification information according to first teller data preset in the target terminal equipment to obtain at least one second verification result; and obtaining the first verification result according to at least one second verification result and a corresponding preset weighting coefficient.
In a second aspect, the present application provides a terminal function operation device, including:
the first acquisition module is used for acquiring first identification information, wherein the first identification information characterizes fingerprint characteristics of a user;
the verification module is used for verifying the first identification information according to first teller data preset in the target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment;
the second acquisition module is used for acquiring second teller data from an authorization server corresponding to the target terminal equipment according to the first verification result, wherein the second teller data represents iris characteristics of a user with operation authority on the target terminal equipment;
an execution module for acquiring second identification information, verifying the second identification information based on the second teller data, and executing a target function after verification, wherein the second identification information characterizes iris characteristics of the user
In one possible implementation, the first verification result includes a confidence coefficient that characterizes a similarity of a fingerprint feature corresponding to the first identification information and a fingerprint feature corresponding to the first teller data; the second obtaining module is specifically configured to, when obtaining second teller data from the authorization server corresponding to the target terminal device according to the first verification result: obtaining corresponding iris characteristic information according to the confidence coefficient, wherein the iris characteristic information characterizes the characteristic scale of the iris characteristic corresponding to the second teller data; and acquiring corresponding second teller data from the authorization server according to the iris characteristic information.
In one possible implementation manner, the second teller data includes an iris image, and the second obtaining module is specifically configured to, when obtaining, from the authorization server, the corresponding second teller data according to the iris feature information: determining a first resolution according to the iris characteristic information, wherein the first resolution characterizes the resolution of the iris image; based on the first resolution, a data request is sent to the authorization server to obtain an iris image having a target resolution that matches the iris feature information.
In one possible implementation manner, the target terminal device is provided with an image acquisition unit, and the execution module is specifically configured to, when acquiring the second identification information: determining a second resolution according to the first verification result, wherein the second resolution represents the image resolution of the face image acquired by the image acquisition unit; the image acquisition unit acquires images based on the second resolution to obtain a target face image; and carrying out feature recognition according to the target face image to obtain the second recognition information.
In one possible implementation manner, the verification module is specifically configured to, when verifying the first identification information according to first teller data preset in the target terminal device to obtain a first verification result: determining a fingerprint acquisition area according to the first identification information, wherein the fingerprint acquisition area represents the size of an area where the fingerprint acquisition unit acquires the fingerprint; and determining the first verification result according to the first identification information, the first teller data and the fingerprint acquisition area.
In one possible implementation manner, the first obtaining module is specifically configured to, when obtaining the first identification information: acquiring a fingerprint image; obtaining finger action information according to the fingerprint image, wherein the finger action information characterizes the pressing characteristics of the finger when the fingerprint image information is acquired; and determining the first identification information according to the finger action information.
In one possible implementation manner, the fingerprint image includes at least two sub-images, and the first obtaining module is specifically configured to, when obtaining the finger motion information according to the fingerprint image: acquiring a pressing area corresponding to the sub-image; determining a pressing sequence according to the pressing areas corresponding to at least two sub-images, wherein the pressing sequence represents the pressed sequence of the pressing areas corresponding to the sub-images; and determining the finger action information according to the pressing sequence.
In one possible implementation manner, the fingerprint image includes a timestamp, and the first obtaining module is further configured to, when obtaining the finger motion information according to the fingerprint image: determining the pressing times of the finger according to the time stamp; and determining the finger action information according to the pressing times of the finger, wherein the pressing times are at least one time.
In one possible implementation manner, the first obtaining module is specifically configured to, when determining the finger action information according to the number of times of pressing the finger: and determining the finger action information according to a first time interval between adjacent pressing actions, wherein the first time interval is smaller than or equal to a specified time interval.
In one possible implementation manner, the first identification information includes at least one third identification information, and the verification module is specifically configured to, when verifying the first identification information according to first teller data preset in the target terminal device to obtain a first verification result: verifying at least one piece of third identification information according to first teller data preset in the target terminal equipment to obtain at least one second verification result; and obtaining the first verification result according to at least one second verification result and a corresponding preset weighting coefficient.
In a third aspect, the application provides an electronic device comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored in the memory to implement the terminal function operation method according to any one of the first aspect of the embodiments of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, the computer-executable instructions being for implementing a terminal function operation method according to any one of the first aspects of the embodiments of the present application when being executed by a processor.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the terminal function operation method according to any one of the first aspects above.
According to the terminal function operation method, the terminal function operation device, the electronic equipment and the storage medium, the first identification information is obtained, and the first identification information represents fingerprint characteristics of a user; verifying the first identification information according to first teller data preset in target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment; acquiring second teller data from an authorization server corresponding to the target terminal equipment according to the first verification result, wherein the second teller data represents iris characteristics of a user with operation authority to the target terminal equipment; and acquiring second identification information, verifying the second identification information based on the second teller data, and executing a target function after verification is passed, wherein the second identification information characterizes iris characteristics of the user. On the basis of acquiring first identification information to perform fingerprint verification to obtain a first verification result, iris verification is performed on second identification information by acquiring second teller data corresponding to the first verification result, so that the execution target function is realized, a business system is logged in, and the problem of low security of the business system caused by the risk of losing and revealing a text password is avoided.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic diagram of a teller and business system matching relationship of the present application;
FIG. 2 is a flowchart of a method for operating a terminal function according to an embodiment of the present application;
FIG. 3 is a schematic diagram showing a specific implementation step of step S102 in the embodiment shown in FIG. 2;
FIG. 4 is a second embodiment of the implementation step of step S102 in the embodiment shown in FIG. 2;
FIG. 5 is a schematic diagram illustrating steps for implementing step S103 in the embodiment shown in FIG. 2;
FIG. 6 is a schematic diagram illustrating steps for implementing step S1032 in the embodiment shown in FIG. 5;
fig. 7 is an application scenario diagram of a terminal function operation method provided by an embodiment of the present application;
FIG. 8 is a schematic diagram illustrating steps for implementing step S104 in the embodiment shown in FIG. 2;
FIG. 9 is a flowchart of a method for operating a terminal function according to another embodiment of the present application;
FIG. 10 is a schematic diagram illustrating steps for implementing step S202 in the embodiment shown in FIG. 9;
FIG. 11 is a schematic view of a fingerprint acquisition area of the fingerprint acquisition unit of the embodiment of FIG. 9;
Fig. 12 is a schematic structural diagram of a terminal function operation device according to an embodiment of the present application;
FIG. 13 is a schematic diagram of an electronic device according to an embodiment of the present application;
fig. 14 is a block diagram of a terminal device according to an exemplary embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
It should be noted that the terminal function operation method, the device, the electronic equipment and the storage medium provided by the application can be used in the distributed field, and can also be used in any field except the distributed field, and the application fields of the terminal function operation method, the device, the electronic equipment and the storage medium provided by the application are not limited.
The specific application scene of the application is that a teller logs in a corresponding matched service system by inputting a password to transact related services for clients. FIG. 1 is a schematic diagram of a matching relationship between a teller and a service system according to the present application, as shown in FIG. 1, the functions of the service systems used by teller with different levels and different services are not necessarily the same, and the same teller may also use a plurality of different service systems, more specifically, for example, teller user_1 may only log into service system sys_1 and corresponding login password pass_1_1; the teller user_2 can log in the service system sys_1, the corresponding login password pass_2_1, the teller user_2 can log in the service system sys_2, the corresponding login password pass_2_2, the teller user_2 can log in the service system sys_3 and the corresponding login password pass_2_3; the teller user_3 can log in the service system sys_1, the corresponding login password pass_3_1, the teller user_3 can log in the service system sys_3, the corresponding login password pass_3_3, the teller logs in the corresponding system according to banking business which is transacted by a customer as required, for example, the teller user_3 logs in the service system sys_1 according to the business task_1 transacted by the customer, and the teller user user_3 logs in the service system sys_3 according to the business task_2 transacted by the customer.
In the prior art, in order to ensure that each teller performs corresponding level business operation in a business system which permits login, after authority personnel opens authorities of related businesses to the teller, the teller can login the business system matched with the teller number by inputting the teller number and the text password. Since the text password is at risk of misuse, loss or theft, the method of logging in the service system through the teller number and the text password can cause the problem of low security of the service system.
The application provides a terminal function operation method, which aims to solve the technical problems in the prior art.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a terminal function operation method according to an embodiment of the present application, and as shown in fig. 2, the terminal function operation method according to the embodiment includes the following steps:
Step S101, acquiring first identification information, where the first identification information characterizes fingerprint features of a user.
The first identification information is, for example, fingerprint information of a user logging into the service system, i.e. the target terminal device is provided with a fingerprint acquisition unit, through which fingerprint information of a teller can be obtained. In a possible implementation manner, referring to the schematic diagram of the matching relationship shown in fig. 1, the target terminal device collects fingerprint information of the teller user_1, the teller user_2 and the teller user_3 through the fingerprint collecting unit, so that the service systems of the corresponding teller can be respectively logged in. Further, the target terminal device collects fingerprint information of different fingers of the teller user_2 through the fingerprint collecting unit, and can log in different corresponding service systems sys_1, sys_2 and sys_3.
Step S102, verifying the first identification information according to first teller data preset in the target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment.
The first teller data is fingerprint verification information for verifying the fingerprint information collected by the fingerprint collection unit, that is, the first identification information is verified by the first teller data, so as to obtain a first verification result. More specifically, for example, the first teller data is preset data, and when the authority personnel opens the authority of the related service to the teller, the fingerprint information of the teller is collected by the fingerprint collection unit, set as the first teller data, and preset and stored in the target terminal device; and when the client transacts the corresponding service, the target terminal equipment acquires the fingerprint information of the teller through the fingerprint acquisition unit and verifies with the preset first teller data, if the verification is successful, a first verification result is obtained, the subsequent login verification operation is executed according to the first verification result, and if the verification fails, the fingerprint information of the teller needs to be acquired again and verified again.
In one possible implementation manner, the reliability of the first verification result is related to the collected fingerprint area, that is, the collected fingerprint area may be used as one of the reference bases for determining the reliability of the first verification result, fig. 3 is one of the specific implementation step diagrams of step S102 in the embodiment shown in fig. 2, and as shown in fig. 3, the specific implementation steps of step S102 include:
step S1021, determining a fingerprint collection area according to the first identification information, wherein the fingerprint collection area characterizes the size of the area where the fingerprint collection unit collects the fingerprint.
Step S1022, determining a first verification result according to the first identification information, the first teller data and the fingerprint collection area.
The fingerprint collection area is exemplified by the size of the area where the fingerprint collection unit collects the fingerprint, that is, the fingerprint collection unit collects the fingerprint information of the teller, and determines the area value corresponding to the collected fingerprint information at the same time, and by analyzing the fingerprint verification information of the first teller data, the area value corresponding to the fingerprint verification information can be determined, so that the first verification result can be determined according to the first identification information, the first teller data, the area value corresponding to the collected fingerprint information and the area value corresponding to the fingerprint verification information, and the credibility of the first verification result can be obtained. More specifically, for example, the collected fingerprint information info_1 and the collected fingerprint information info_2 are verified according to the preset fingerprint verification information, respectively, under the same condition, if the area value corresponding to the collected fingerprint information info_1 is 15 and the area value corresponding to the fingerprint verification information is 20 as the standard value, the ratio of the two is 0.75, if the area value corresponding to the collected fingerprint information info_2 is 18, the ratio of the area value corresponding to the collected fingerprint information to the area value corresponding to the fingerprint verification information is 0.9, and further, the reliability of the first verification result res_2 corresponding to the collected fingerprint information info_2 is greater than the reliability of the first verification result res_1 corresponding to the collected fingerprint information info_1 can be determined according to the reliability relationship.
In the step of this embodiment, by introducing the fingerprint collection area as one of the bases for ensuring the credibility of the first verification result, that is, under the same condition, the larger the area corresponding to the collected fingerprint information is, the larger the credibility of the first verification result obtained by verifying the collected fingerprint information according to the fingerprint verification information is, so that the security of the service system can be improved.
In another possible implementation manner, according to the security level of the service system, the teller should log in the service system at least once for fingerprint verification, that is, the first identification information includes at least one third identification information, fig. 4 is a second schematic diagram of a specific implementation step of step S102 in the embodiment shown in fig. 2, and as shown in fig. 4, the specific implementation steps of step S102 include:
step S102a, verifying at least one third identification information according to first teller data preset in the target terminal equipment to obtain at least one second verification result.
Step S102b, obtaining a first verification result according to at least one second verification result and a corresponding preset weighting coefficient.
For example, according to the security level of the service system, when the teller logs in the service system for one time, the first identification information includes a third identification information, that is, the first identification information includes a collected fingerprint information info_1, according to the preset fingerprint verification information, the collected fingerprint information info_1 is verified to obtain a second verification result res_sec_1, and because only one collected fingerprint information in the first identification information is preset, the weighting coefficient is num_1, and then according to the weighted average method, the first verification result res_1 is obtained.
For example, according to the security level of the service system, the teller logs in to the service system at least twice, more specifically, for example, the verification times are three times, the first identification information includes three pieces of third identification information, that is, the first identification information includes collected fingerprint information info_1, collected fingerprint information info_2 and collected fingerprint information info_3, according to preset fingerprint verification information, where the preset fingerprint verification information may be fingerprint verification information of the same finger or fingerprint verification information of different fingers, and further verifies the three collected fingerprint information to obtain second verification results, that is, res_sec_1, res_sec_2 and res_sec_3, and the corresponding preset weighting coefficients are num_1, num_2 and num_3, and further, as shown in formula (1), the first verification result, that is, res_1 is obtained by calculating by a weighted average method is obtained.
In the steps of this embodiment, by introducing the method of multiple verification and weighted average method to determine the first verification result, the security of the service system can be improved, more specifically, according to the security level of the service system, by introducing the method of verification times, successful login of the service system by a single teller can be achieved, and also, login of the service system by simultaneous verification of multiple teller can be achieved, for example, three teller correspond to one fingerprint verification respectively, and three fingerprint verifications are performed in total to achieve login of the service system.
Step S103, according to the first verification result, second teller data is obtained from an authorization server corresponding to the target terminal equipment, and the second teller data represents iris characteristics of a user with operation authority on the target terminal equipment.
The second teller data is iris verification data of a user having operation authority to the target terminal device, and according to the security level of the service system, when the first identification information is verified according to the first teller data to obtain a first verification result, a second verification, namely iris recognition verification, is performed to log in the service system. More specifically, when the first identification information is verified according to the first teller data to obtain a first verification result, a teller number is obtained, and according to the teller number, second teller data matched with the teller number, namely iris verification data, is obtained from an authorization server corresponding to the target terminal device.
In a possible implementation manner, because the data size of the iris data is huge, the time required for transmitting the iris data from the authorization server to the target terminal device is long, so that the required data size of the iris data can be determined according to the first verification result, and further, the second teller data is obtained, fig. 5 is a schematic diagram of a specific implementation step of step S103 in the embodiment shown in fig. 2, and as shown in fig. 5, the specific implementation step of step S103 includes:
Step S1031, obtaining corresponding iris characteristic information according to the confidence coefficient, wherein the iris characteristic information characterizes the characteristic scale of the iris characteristic corresponding to the second teller data.
Step S1032, obtaining the corresponding second teller data from the authorization server according to the iris characteristic information.
Illustratively, the confidence rate characterizes the similarity of the fingerprint feature corresponding to the first identification information and the fingerprint feature corresponding to the first teller data, and the greater the confidence rate, the higher the similarity of the fingerprint feature corresponding to the first identification information (collected fingerprint information) and the fingerprint feature corresponding to the first teller data (fingerprint verification information) is proved. More specifically, for example, when the fingerprint collection unit collects the fingerprint of the teller, if the finger of the teller is dry and clean, the collected fingerprint information is verified according to the fingerprint verification information, and the obtained confidence is 99%, that is, the similarity between the collected fingerprint information and the fingerprint verification information is 99%; if the degree of cleanliness of the finger of the teller is low or the finger is wet, the collected fingerprint information is verified according to the fingerprint verification information, and the obtained confidence coefficient is 95%, namely the similarity of the collected fingerprint information and the fingerprint verification information is 95%.
The iris characteristic information is an iris characteristic data amount corresponding to the iris data, the corresponding iris characteristic data amount is determined through the confidence coefficient, and then the corresponding second teller data can be determined according to the iris characteristic data amount. More specifically, for example, 100 of the total data amount of iris data corresponding to a teller logged into the service system, the corresponding iris feature data amount, that is, the number of iris data of a corresponding proportion is extracted from the total data amount, may be determined according to the confidence obtained by verifying the fingerprint information, and then the second teller data, that is, the iris verification data, is determined according to the iris feature data amount. In one possible implementation manner, when the fingerprint acquisition unit acquires the fingerprints of the teller, if the fingers of the teller are dry and clean, and the corresponding determined confidence coefficient is 99%, determining iris characteristic information, namely an iris characteristic data quantity char_1, according to the 99% confidence coefficient, and further obtaining iris verification data according to the iris characteristic data quantity char_1; when the fingerprint acquisition unit acquires fingerprints of a teller, if the finger cleanliness of the teller is low or the finger is wet, the corresponding determined confidence coefficient is 95%, the iris characteristic data quantity char_2 is determined according to the 95% confidence coefficient, and further iris verification data is obtained according to the iris characteristic data quantity char_2, wherein the iris characteristic data quantity char_1 is smaller than the iris characteristic data quantity char_2. More generally, the higher the confidence, the less data is required to correspond to the desired iris feature data.
In one possible implementation manner, fig. 6 is a schematic diagram of specific implementation steps of step S1032 in the embodiment shown in fig. 5, where, as shown in fig. 6, the specific implementation steps of step S1032 include:
step S10321, determining a first resolution according to the iris characteristic information, wherein the first resolution characterizes the resolution of the iris image.
Step S13022, based on the first resolution, transmits a data request to the authorization server to obtain an iris image having a target resolution matching the iris feature information.
The second teller data includes an iris image, that is, the iris verification data includes an iris image, and when the image information is compared, the resolution of the image needs to be ensured, and the corresponding iris feature data amount is determined through the confidence coefficient, so that the corresponding first resolution, that is, the resolution of the iris image is determined, and the iris image, that is, the second teller data, that is, the iris verification data is acquired according to the determined first resolution. More specifically, for example, the iris feature data amount char_1 is determined from the confidence of 99%, the iris feature data amount char_2 is determined from the confidence of 95%, the resolution reso_1 of the iris image is determined from the iris feature data amount char_1, and the resolution reso_2 of the iris image is determined from the iris feature data amount char_2. Because the higher the resolution of the image is, the larger the corresponding data volume is, and the resolution of the iris image, the request for data is sent to the authorization server according to the resolution of the iris image, wherein the resolution of the iris image, the request for data, is obtained according to the fact that the iris characteristic data volume, the char_1, is smaller than the iris characteristic data volume, char_2, and respectively obtaining iris verification data homomo_1 and iris verification data homomo_2 of target resolution matched with the iris characteristic information, wherein the data volume of the iris verification data homomo_1 is smaller than that of the iris verification data homomo_2.
In the step of this embodiment, because the data volume of the iris verification data is huge, the time required for transmitting the iris verification data from the authorization server to the target terminal device is long, and the occupied network transmission resources are large, so that the confidence coefficient obtained by verifying the collected fingerprint information according to the fingerprint verification information is used as the pre-verification step, the iris characteristic data volume is determined based on the magnitude of the confidence coefficient, the data volume of the iris verification data can be determined according to the corresponding iris characteristic data volume, and further, in order to reduce the duration of transmitting the iris verification data from the authorization server to the target terminal device, the iris characteristic data volume can be determined according to the confidence coefficient in the pre-verification step, and the corresponding data volume of the iris verification data can be reduced, wherein the increasing and decreasing relation between the confidence coefficient and the iris characteristic data volume can be adjusted according to the security level of the service system.
Step S104, second identification information is obtained, verification is carried out on the second identification information based on second teller data, and after verification is passed, the target function is executed, wherein the second identification information characterizes iris characteristics of the user.
The second identifying information is, for example, iris data collected by the target terminal device for the teller through the image collecting unit, the collected iris data is verified according to second teller data obtained from the authorization server, namely, iris verification data, and after verification is passed, a target function is executed, namely, a service system of the target terminal device corresponding to the teller number is logged in. More specifically, for example, fig. 7 is an application scenario diagram of a terminal function operation method provided by the embodiment of the present application, as shown in fig. 7, a target terminal device acquires fingerprint information of a teller through a fingerprint acquisition unit, verifies the acquired fingerprint information according to preset fingerprint verification information to obtain a first verification result, that is, a confidence coefficient, further determines an iris feature data amount according to the confidence coefficient, sends a data request to an authorization server based on the iris feature data amount to obtain corresponding second teller data, that is, iris verification data, verifies iris data acquired by an image acquisition unit according to the iris verification data, and after verification passes, can execute a target function and log in a corresponding service system.
In one possible implementation manner, fig. 8 is a schematic diagram of steps in the implementation of step S104 in the embodiment shown in fig. 2, and as shown in fig. 8, the steps in the implementation of step S104 include:
step S1041, determining a second resolution according to the first verification result, where the second resolution characterizes the image resolution of the face image acquired by the image acquisition unit.
In step S1042, the image acquisition unit acquires an image based on the second resolution to obtain a target face image.
The second resolution is an image resolution of a face image acquired by the target terminal device through the image acquisition unit, the larger the image resolution is, the more pixels of the image are, the more accurate the image verification result is, however, the more pixels of the image are, the more data volume of the corresponding image is, and therefore, the longer the time period consumed for data processing and comparison verification is. In one possible implementation manner, the first verification result, namely the confidence coefficient, represents the similarity of the collected fingerprint information and the fingerprint verification information, the greater the confidence coefficient is, the greater the similarity is, according to the security level of the service system, the greater the confidence coefficient is, the resolution adopted when the collected face image is carried out can be adaptively reduced on the premise of ensuring the security of the system, so as to reduce the data size of the collected face image, and further, the image collection is carried out according to the second resolution determined by the confidence coefficient, so that the target face image is obtained. More specifically, for example, the second resolution reso_3 determined according to the confidence 99% is smaller than the second resolution reso_4 determined according to the confidence 95%, and further, the corresponding target face image image_1 and the target face image image_2 are determined according to the second resolution reso_3 and the second resolution reso_4, and at the same time, the pixels of the target face image image_1 are fewer than the pixels of the target face image image_2.
Step S1043, performing feature recognition according to the target face image to obtain second recognition information.
The information acquisition is performed on the face of the teller by the image acquisition unit of the target terminal device, and the acquired target face image comprises second identification information, namely acquired iris data. More specifically, the target face image collected by the image collecting unit comprises face outline data, facial five-sense organ data and iris data, and the characteristic recognition is carried out on the target face image according to the verification rule of the login service system, so that collected iris data is obtained.
In the step of this embodiment, the number of pixels of the target face image to be acquired is determined according to the second resolution obtained by the first verification result, so that the target face images with different data amounts are obtained according to the second resolution, and further, if the data amount of the target face image is lower, the image processing speed can be improved when the feature recognition is performed to obtain the second recognition information.
In this embodiment, by acquiring first identification information, the first identification information characterizes fingerprint features of a user; verifying the first identification information according to first teller data preset in the target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment; according to the first verification result, second teller data are obtained from an authorization server corresponding to the target terminal equipment, and the second teller data represent iris characteristics of a user with operation authority on the target terminal equipment; and acquiring second identification information, verifying the second identification information based on second teller data, and executing a target function after verification is passed, wherein the second identification information characterizes iris characteristics of the user. On the basis of acquiring first identification information to perform fingerprint verification to obtain a first verification result, iris verification is performed on second identification information by acquiring second teller data corresponding to the first verification result, so that the execution target function is realized, a business system is logged in, and the problem of low security of the business system caused by the risk of losing and revealing a text password is avoided.
Fig. 9 is a flowchart of a terminal function operation method according to another embodiment of the present application, and as shown in fig. 9, the terminal function operation method according to this embodiment further refines step S101 on the basis of the terminal function operation method according to the embodiment shown in fig. 2, and then the terminal function operation method according to this embodiment includes the following steps:
step S201, a fingerprint image is acquired.
Step S202, finger action information is obtained according to the fingerprint image, wherein the finger action information characterizes the pressing characteristics of the finger when the fingerprint image information is obtained.
Illustratively, the target terminal device acquires the fingerprint of the teller through the fingerprint acquisition unit, and obtains a fingerprint image of the teller. Finger motion information can be determined according to the fingerprint image, wherein the finger motion information refers to the pressing motion characteristics of the finger of the teller when the fingerprint acquisition unit acquires the fingerprint of the teller.
In a possible implementation manner, the fingerprint image includes at least two sub-images, and the finger motion information is obtained according to the fingerprint image, and fig. 10 is a schematic diagram of a specific implementation step of step S202 in the embodiment shown in fig. 9, where, as shown in fig. 10, the specific implementation steps of step S202 include:
In step S2021, a pressed area corresponding to the sub-image is acquired.
Step S2022, determining a pressing sequence according to the pressing regions corresponding to the at least two sub-images, where the pressing sequence characterizes the pressed sequence of the pressing regions corresponding to the sub-images.
Step S2023, determining finger action information according to the pressing sequence.
Fig. 11 is a schematic diagram of a fingerprint collection area of a fingerprint collection unit in the embodiment shown in fig. 9, where, as shown in fig. 11, the fingerprint collection area includes A, B, C, D, E five sub-areas, and when the fingerprint collection unit acquires a fingerprint image, the fingerprint collection unit determines a pressing area corresponding to the fingerprint image, that is, determines a pressing area corresponding to the sub-image, further determines a pressing sequence according to the pressing areas corresponding to at least two sub-images, that is, determines a front-back order of collecting fingerprints, and further determines finger motion information according to the front-back order of collecting fingerprints. More specifically, for example, the pressing area corresponding to the sub-image image_3_1 is a combination of three sub-areas ABC, the corresponding pressing time is time_1, the pressing area corresponding to the sub-image image_3_2 is a combination of three sub-areas BCE, the corresponding pressing time is time_2, and the pressing sequence is determined from the sub-image image_3_1 to the sub-image image_3_2 according to the pressing time time_1 being earlier than the pressing time time_2. Further, according to the pressing sequence from the sub-image image_3_1 to the sub-image image_3_2, finger action information of the teller when the fingerprint collection unit collects the fingerprint of the teller can be determined, namely, the finger pressing action is that three sub-area combinations of ABC are pressed first and then three sub-area combinations of BCE are pressed.
In another possible implementation manner, the fingerprint image includes a time stamp, and the finger action information is obtained according to the fingerprint image, and further includes: determining the pressing times of the finger according to the time stamp; determining finger action information according to the pressing times of the finger, wherein the pressing times are at least one time; and determining finger action information according to a first time interval between adjacent pressing actions, wherein the first time interval is smaller than or equal to a specified time interval. More specifically, for example, when the fingerprint collection unit collects fingerprints of a teller, according to the fingerprint images with the time stamps collected by the fingerprint collection unit, the number of times of pressing the finger when logging in the service system is determined, one time of pressing corresponds to one fingerprint image with the time stamps, further, according to different times of pressing of the finger, different finger action information can be determined, further, in more than 1 time of pressing actions, in order to ensure the safety of the service system, a first time interval between adjacent pressing actions is smaller than or equal to a preset time interval, for example, the preset time interval is 3 seconds, a first time interval between adjacent pressing actions is smaller than or equal to 3 seconds, and corresponding finger action information is effective information; otherwise, the finger action information is invalid information, and the fingerprint acquisition unit is required to acquire the fingerprints of the teller again.
Step S203, determining first identification information according to the finger motion information.
Illustratively, the fingerprint of the teller is collected by the fingerprint collection unit, the finger action information is determined, and then the first identification information, namely the collected fingerprint information, is obtained according to the finger action information. More specifically, for example, from the fingerprint of the teller collected by the fingerprint collection unit, finger motion information is determined, such as determining the order of collecting the fingerprints: the finger pressing action is to press three sub-region combinations of ABC first and then press three sub-region combinations of BCE first, and then the collected fingerprint information is determined according to the sequence before and after the collected fingerprints.
In the step of the embodiment, on the basis of acquiring the fingerprint image of the teller, the fingerprint information of the teller is specifically determined by introducing the finger action information, such as the sequence before and after the collection of the fingerprints and/or the number of pressing times of the fingers, namely, the collected fingerprint information is determined according to the fingerprint image and the finger action information at the same time, so that the safety of the service system is ensured.
Step S204, verifying the first identification information according to first teller data preset in the target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment.
Step S205, according to the first verification result, second teller data is obtained from an authorization server corresponding to the target terminal device, wherein the second teller data represents iris characteristics of a user with operation authority on the target terminal device.
Step S206, obtaining second identification information, verifying the second identification information based on the second teller data, and executing the target function after verification, wherein the second identification information characterizes iris characteristics of the user.
In this embodiment, the implementation manner of step S204 to step S206 is the same as the implementation manner of step S102 to step S104 in the embodiment shown in fig. 2 of the present application, and will not be described in detail here.
Fig. 12 is a schematic structural diagram of a terminal function operation device according to an embodiment of the present application, and as shown in fig. 12, the terminal function operation device 3 according to this embodiment includes:
a first obtaining module 31, configured to obtain first identification information, where the first identification information characterizes a fingerprint feature of a user;
the verification module 32 is configured to verify the first identification information according to first teller data preset in the target terminal device, to obtain a first verification result, where the first teller data is used to characterize fingerprint features of a user having operation authority on the target terminal device;
A second obtaining module 33, configured to obtain, according to the first verification result, second teller data from an authorization server corresponding to the target terminal device, where the second teller data represents iris features of a user having operation rights to the target terminal device;
and an execution module 34, configured to obtain second identification information, and verify the second identification information based on the second teller data, and execute the target function after the verification is passed, where the second identification information characterizes iris features of the user.
In one possible implementation, the first verification result includes a confidence coefficient, where the confidence coefficient characterizes a similarity of a fingerprint feature corresponding to the first identification information and a fingerprint feature corresponding to the first teller data; the second obtaining module 33 is specifically configured to, when obtaining the second teller data from the authorization server corresponding to the target terminal device according to the first verification result: obtaining corresponding iris characteristic information according to the confidence coefficient, wherein the iris characteristic information characterizes the characteristic scale of the iris characteristic corresponding to the second teller data; and acquiring corresponding second teller data from the authorization server according to the iris characteristic information.
In one possible implementation, the second teller data includes an iris image, and the second obtaining module 33 is specifically configured to, when obtaining the corresponding second teller data from the authorization server according to the iris feature information: determining a first resolution according to the iris characteristic information, wherein the first resolution is used for representing the resolution of an iris image; based on the first resolution, a data request is sent to an authorization server to obtain an iris image having a target resolution that matches iris feature information.
In a possible implementation manner, the target terminal device is provided with an image acquisition unit, and the execution module 34 is specifically configured to, when acquiring the second identification information: determining a second resolution according to the first verification result, wherein the second resolution represents the image resolution of the face image acquired by the image acquisition unit; the image acquisition unit acquires images based on the second resolution to obtain a target face image; and carrying out feature recognition according to the target face image to obtain second recognition information.
In one possible implementation manner, the verification module 32 is specifically configured to, when verifying the first identification information according to the first teller data preset in the target terminal device to obtain the first verification result: determining a fingerprint acquisition area according to the first identification information, wherein the fingerprint acquisition area characterizes the size of the area where the fingerprint acquisition unit acquires the fingerprint; and determining a first verification result according to the first identification information, the first teller data and the fingerprint acquisition area.
In one possible implementation manner, the first obtaining module 31 is specifically configured to, when obtaining the first identification information: acquiring a fingerprint image; according to the fingerprint image, finger action information is obtained, wherein the finger action information characterizes the pressing characteristics of the finger when the fingerprint image information is obtained; and determining the first identification information according to the finger action information.
In one possible implementation, the fingerprint image includes at least two sub-images, and the first obtaining module 31 is specifically configured to, when obtaining the finger motion information according to the fingerprint image: acquiring a pressing area corresponding to the sub-image; determining a pressing sequence according to the pressing areas corresponding to the at least two sub-images, wherein the pressing sequence represents the pressed sequence of the pressing areas corresponding to the sub-images; and determining finger action information according to the pressing sequence.
In one possible implementation, the fingerprint image includes a timestamp, and the first obtaining module 31 is further configured to, when obtaining the finger motion information according to the fingerprint image: determining the pressing times of the finger according to the time stamp; and determining finger action information according to the pressing times of the finger, wherein the pressing times are at least one time.
In one possible implementation manner, the first obtaining module 31 is specifically configured to, when determining the finger action information according to the number of times of pressing the finger: and determining finger action information according to a first time interval between adjacent pressing actions, wherein the first time interval is smaller than or equal to a specified time interval.
In one possible implementation manner, the first identification information includes at least one third identification information, and the verification module 32 is specifically configured to, when verifying the first identification information according to first teller data preset in the target terminal device to obtain a first verification result: verifying at least one piece of third identification information according to first teller data preset in the target terminal equipment to obtain at least one second verification result; and obtaining a first verification result according to at least one second verification result and the corresponding preset weighting coefficient.
The first acquiring module 31, the verifying module 32, the second acquiring module 33 and the executing module 34 are sequentially connected. The terminal function operation device 3 provided in this embodiment may execute the technical scheme of the method embodiment shown in any one of fig. 2 to 11, and its implementation principle and technical effect are similar, and will not be described herein again.
Fig. 13 is a schematic diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 13, an electronic device 4 according to the present embodiment includes: a processor 41, and a memory 42 communicatively coupled to the processor 41.
Wherein the memory 42 stores computer-executable instructions;
the processor 41 executes computer-executable instructions stored in the memory 42 to implement the terminal function operation method provided in any of the embodiments corresponding to fig. 2 to 11 of the present application.
Wherein the memory 42 and the processor 41 are connected by a bus 43.
The relevant descriptions and effects corresponding to the steps in the embodiments corresponding to fig. 2 to 11 may be understood correspondingly, and are not described in detail herein.
An embodiment of the present application provides a computer readable storage medium, where computer executable instructions are stored, where the computer executable instructions are used to implement the terminal function operation method provided in any of the embodiments corresponding to fig. 2 to 11 of the present application when the computer executable instructions are executed by a processor.
The computer readable storage medium may be, among other things, ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
An embodiment of the present application provides a computer program product, which includes a computer program, where the computer program when executed by a processor implements the terminal function operation method provided in any of the embodiments corresponding to fig. 2 to 11 of the present application.
Fig. 14 is a block diagram of a terminal device, which may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, etc., in accordance with an exemplary embodiment.
Terminal device 800 can include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the terminal device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interactions between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the terminal device 800. Examples of such data include instructions for any application or method operating on terminal device 800, contact data, phonebook data, messages, pictures, video, and the like. The memory 804 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 806 provides power to the various components of the terminal device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal device 800.
The multimedia component 808 includes a screen between the terminal device 800 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or sliding action, but also the duration and pressure associated with the touch or sliding operation. In some embodiments, the multimedia component 808 includes a front camera and/or a rear camera. The front camera and/or the rear camera may receive external multimedia data when the terminal device 800 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the terminal device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 further includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of the terminal device 800. For example, the sensor assembly 814 may detect an on/off state of the terminal device 800, a relative positioning of the assemblies, such as a display and keypad of the terminal device 800, the sensor assembly 814 may also detect a change in position of the terminal device 800 or a component of the terminal device 800, the presence or absence of a user's contact with the terminal device 800, an orientation or acceleration/deceleration of the terminal device 800, and a change in temperature of the terminal device 800. The sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communication between the terminal device 800 and other devices, either wired or wireless. The terminal device 800 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal device 800 can be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 804 including instructions executable by processor 820 of terminal device 800 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
A non-transitory computer readable storage medium, which when executed by a processor of a terminal device, causes the terminal device to perform the terminal function operation method of the terminal device.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A terminal function operation method, characterized in that the method comprises:
acquiring first identification information, wherein the first identification information characterizes fingerprint characteristics of a user;
Verifying the first identification information according to first teller data preset in target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment;
acquiring second teller data from an authorization server corresponding to the target terminal equipment according to the first verification result, wherein the second teller data represents iris characteristics of a user with operation authority to the target terminal equipment;
and acquiring second identification information, verifying the second identification information based on the second teller data, and executing a target function after verification is passed, wherein the second identification information characterizes iris characteristics of the user.
2. The method of claim 1, wherein the first verification result includes a confidence rating characterizing a similarity of the fingerprint feature corresponding to the first identification information to the fingerprint feature corresponding to the first teller data;
and acquiring second teller data from an authorization server corresponding to the target terminal device according to the first verification result, wherein the second teller data comprises:
obtaining corresponding iris characteristic information according to the confidence coefficient, wherein the iris characteristic information characterizes the characteristic scale of the iris characteristic corresponding to the second teller data;
And acquiring corresponding second teller data from the authorization server according to the iris characteristic information.
3. The method of claim 2, wherein the second teller data comprises an iris image, and the obtaining corresponding second teller data from the authorization server based on the iris characteristic information comprises:
determining a first resolution according to the iris characteristic information, wherein the first resolution characterizes the resolution of the iris image;
based on the first resolution, a data request is sent to the authorization server to obtain an iris image having a target resolution that matches the iris feature information.
4. The method according to claim 1, wherein the target terminal device is provided with an image acquisition unit, and the acquiring the second identification information comprises:
determining a second resolution according to the first verification result, wherein the second resolution represents the image resolution of the face image acquired by the image acquisition unit;
the image acquisition unit acquires images based on the second resolution to obtain a target face image;
and carrying out feature recognition according to the target face image to obtain the second recognition information.
5. The method of claim 1, wherein verifying the first identification information according to first teller data preset in the target terminal device, to obtain a first verification result, includes:
determining a fingerprint acquisition area according to the first identification information, wherein the fingerprint acquisition area represents the size of an area where the fingerprint acquisition unit acquires the fingerprint;
and determining the first verification result according to the first identification information, the first teller data and the fingerprint acquisition area.
6. The method of claim 1, wherein the obtaining the first identification information comprises:
acquiring a fingerprint image;
obtaining finger action information according to the fingerprint image, wherein the finger action information characterizes the pressing characteristics of the finger when the fingerprint image information is acquired;
and determining the first identification information according to the finger action information.
7. The method according to claim 1, wherein the first identification information includes at least one third identification information, and the verifying the first identification information according to first teller data preset in the target terminal device, to obtain a first verification result includes:
Verifying at least one piece of third identification information according to first teller data preset in the target terminal equipment to obtain at least one second verification result;
and obtaining the first verification result according to at least one second verification result and a corresponding preset weighting coefficient.
8. A terminal function operation device, comprising:
the first acquisition module is used for acquiring first identification information, wherein the first identification information characterizes fingerprint characteristics of a user;
the verification module is used for verifying the first identification information according to first teller data preset in the target terminal equipment to obtain a first verification result, wherein the first teller data is used for representing fingerprint characteristics of a user with operation authority on the target terminal equipment;
the second acquisition module is used for acquiring second teller data from an authorization server corresponding to the target terminal equipment according to the first verification result, wherein the second teller data represents iris characteristics of a user with operation authority on the target terminal equipment;
and the execution module is used for acquiring second identification information, verifying the second identification information based on the second teller data, and executing a target function after the verification is passed, wherein the second identification information characterizes iris characteristics of the user.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1 to 7.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1 to 7.
CN202311234921.XA 2023-09-22 2023-09-22 Terminal function operation method and device, electronic equipment and storage medium Pending CN117240471A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311234921.XA CN117240471A (en) 2023-09-22 2023-09-22 Terminal function operation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311234921.XA CN117240471A (en) 2023-09-22 2023-09-22 Terminal function operation method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117240471A true CN117240471A (en) 2023-12-15

Family

ID=89090761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311234921.XA Pending CN117240471A (en) 2023-09-22 2023-09-22 Terminal function operation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117240471A (en)

Similar Documents

Publication Publication Date Title
US10643054B2 (en) Method and device for identity verification
CN106709399B (en) Fingerprint identification method and device
CN107025419B (en) Fingerprint template inputting method and device
CN109145560B (en) Method and device for accessing monitoring equipment
CN110675539B (en) Identity verification method and device, electronic equipment and storage medium
CN106454392A (en) Live broadcast processing method, device and terminal
US11004163B2 (en) Terminal-implemented method, server-implemented method and terminal for acquiring certification document
CN106557755B (en) Fingerprint template acquisition method and device
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
EP3457271B1 (en) Methods, devices and storage medium for printing information
CN111368232A (en) Password sharing reflux method and device, electronic equipment and storage medium
CN109324863A (en) The method, apparatus and computer readable storage medium of fingerprint recognition
CN112667984A (en) Identity authentication method and device, electronic equipment and storage medium
CN106980836B (en) Identity verification method and device
CN107145771B (en) Application program unlocking method and device and terminal
CN114648796A (en) User identification method, device, storage medium and electronic equipment
US10095911B2 (en) Methods, devices, and computer-readable mediums for verifying a fingerprint
CN112989299A (en) Interactive identity recognition method, system, device and medium
CN110764847B (en) User information processing method, device, electronic equipment and storage medium
CN111651627A (en) Data processing method and device, electronic equipment and storage medium
CN112241652A (en) Fingerprint identification method and device
EP3236377B1 (en) Method, device and system for preventing account from being broken into
CN117240471A (en) Terminal function operation method and device, electronic equipment and storage medium
CN110708427B (en) Information processing method, device and storage medium
CN105653623A (en) Picture collecting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination