WO2016206132A1 - 身份验证方法及装置 - Google Patents

身份验证方法及装置 Download PDF

Info

Publication number
WO2016206132A1
WO2016206132A1 PCT/CN2015/083201 CN2015083201W WO2016206132A1 WO 2016206132 A1 WO2016206132 A1 WO 2016206132A1 CN 2015083201 W CN2015083201 W CN 2015083201W WO 2016206132 A1 WO2016206132 A1 WO 2016206132A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
reserved
matching
fingerprints
user
Prior art date
Application number
PCT/CN2015/083201
Other languages
English (en)
French (fr)
Inventor
张充
袁刚
郑礼良
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2016206132A1 publication Critical patent/WO2016206132A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the present application relates to the field of terminal technologies, and in particular, to an identity verification method and apparatus.
  • Smartphones can not only implement basic communication functions such as calls, but also install various financial programs such as Alipay, as well as social programs such as WeChat. These applications need to authenticate the user's identity when implementing certain features.
  • a commonly used authentication method is that the user pre-stores multiple fingerprint data.
  • the fingerprint to be recognized input by the user is randomly compared with the pre-stored fingerprint data to complete the identity verification.
  • this type of authentication is less efficient.
  • the present application provides an authentication method to improve the efficiency of authentication.
  • the present application also provides an identity verification device to ensure the application and implementation of the method in practice.
  • An authentication method that includes:
  • the target program is a program that needs to be authenticated
  • the preset fingerprint database stores a plurality of fingerprints reserved by the user
  • each of the reserved fingerprints in the preset fingerprint database Each has a matching number of times, and the number of matching times is used to indicate the total number of times the reserved fingerprint matches the fingerprint to be identified input by the user;
  • the determining, by the user, the operation of inputting the fingerprint to be identified, determining a matching priority of each reserved fingerprint in the preset fingerprint database including:
  • the matching priority of each of the reserved fingerprints is generated according to the order of the matching times of the respective reserved fingerprints.
  • the foregoing authentication method pre-records a time point at which each of the reserved fingerprints is successfully matched with the fingerprint to be recognized by the user.
  • the matching priority of each of the reserved fingerprints is generated according to the order of the matching times of the respective reserved fingerprints, including:
  • the same initial matching priority is adjusted according to the sequence of the recorded time points.
  • the foregoing authentication method pre-records the reserved fingerprint that has been successfully matched with the fingerprint to be identified that is input by the user.
  • the matching priority of each of the reserved fingerprints is generated according to the order of the matching times of the respective reserved fingerprints, including:
  • the initial matching priority of the reserved fingerprint is increased.
  • the foregoing authentication method further includes:
  • an alternate authentication interface is displayed for the user to perform identity verification on the candidate authentication interface; wherein the candidate authentication interface is a password verification interface or a graphic verification interface.
  • the application also provides an identity verification device, including:
  • the fingerprint input module is configured to prompt the user to input the fingerprint to be recognized in response to the user opening the target program; wherein the target program is a program that needs to perform identity verification;
  • a matching priority determining module configured to respond to a user inputting an operation of the fingerprint to be identified, and determining a preset finger a matching priority of each reserved fingerprint in the texture library; wherein the preset fingerprint database stores a plurality of fingerprints reserved by the user;
  • the fingerprint matching module is configured to match the reserved fingerprints with the to-be-identified fingerprints according to the matching of the matching priorities, and obtain an identity verification result.
  • each of the reserved fingerprints in the preset fingerprint database has a respective matching number, and the matching times are used to indicate a reserved fingerprint and a fingerprint to be recognized input by a user.
  • the matching priority determining module includes:
  • the matching priority generation sub-module is configured to respond to the user inputting the fingerprint to be recognized, and generate a matching priority of each of the reserved fingerprints according to the order of the matching times of the reserved fingerprints.
  • the foregoing identity verification apparatus pre-records a time point at which each of the reserved fingerprints is successfully matched with the fingerprint to be recognized by the user last time;
  • the matching priority generation submodule includes:
  • a first matching priority generation sub-module configured to determine an initial matching priority of each of the reserved fingerprints according to an operation of inputting a fingerprint to be recognized by a user, according to a ranking of the matching times of the respective reserved fingerprints;
  • the first matching priority adjustment sub-module is configured to adjust the same initial matching priority according to the sequence of the recorded time points if there is a case where the initial matching priorities are the same.
  • the foregoing identity verification device pre-records the reserved fingerprint that has been successfully matched with the fingerprint to be recognized by the user last time;
  • the matching priority generation submodule includes:
  • a second matching priority generation sub-module configured to determine an initial matching priority of each of the reserved fingerprints according to an operation of inputting a fingerprint to be recognized by a user, according to a ranking of the matching times of the reserved fingerprints;
  • the second matching priority adjustment sub-module is configured to increase the initial matching priority of the reserved fingerprint when the reserved fingerprint has the same initial matching priority as the other reserved fingerprints.
  • the foregoing identity verification apparatus further includes:
  • An alternate authentication module configured to display an alternate authentication interface for the user to perform authentication on the alternate authentication interface if the authentication result is a failure; wherein the candidate authentication is performed
  • the interface is a password verification interface or a graphic verification interface.
  • the embodiment of the authentication method provided by the application may be configured to prompt the user to input the fingerprint to be identified for identity verification in response to the user opening the operation of the identity verification program, and the preset fingerprint database after the user inputs the fingerprint data to be identified.
  • Each of the reserved fingerprints determines a respective matching priority, wherein the matching of the matching priorities can indicate the priority order of the users for each reserved fingerprint, and then sorts the priorities according to the matching priorities. Align with the fingerprint to be identified to obtain the result of the authentication.
  • the present embodiment does not randomly compare the reserved fingerprint with the fingerprint to be identified, but determines the comparison order of the reserved fingerprints according to the determined matching priority, taking into account the user's fingerprint. Usage, which increases the probability of obtaining authentication results with fewer matching times, which improves the efficiency of authentication and better user experience.
  • FIG. 2 is a flowchart of an implementation manner for determining a matching priority provided by the present application
  • FIG. 3 is a flowchart of another implementation manner for determining a matching priority provided by the present application.
  • FIG. 5 is a schematic structural diagram of an embodiment of an identity verification apparatus provided by the present application.
  • FIG. 6 is a schematic structural diagram of another embodiment of an identity verification apparatus provided by the present application.
  • FIG. 1 there is shown a flow of one embodiment of an authentication method provided by the present application.
  • This embodiment can be, but is not limited to, applied to a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable computer, or the like.
  • this embodiment may specifically include steps S101 to S103.
  • Step S101 In response to the user opening the target program, prompting the user to input the fingerprint to be recognized; wherein the target program is a program that needs to perform identity verification.
  • a user-initiated program that requires authentication is referred to as a target program.
  • the embodiment prompts the user to input a fingerprint for identification, thereby verifying whether the user is a legitimate user according to the input fingerprint.
  • the fingerprint input by the user may be referred to as a fingerprint to be recognized.
  • step S102 in response to the user inputting the fingerprint to be identified, the matching priority of each reserved fingerprint in the preset fingerprint database is determined; wherein the preset fingerprint database stores a plurality of fingerprints reserved by the user.
  • the fingerprint storage library is preset in the embodiment, and the fingerprint reserved by the user is stored in the fingerprint database, and the fingerprint is multiple. It should be noted that, in the scenario in which the multi-fingerprint is used to authenticate the fingerprint, the solution is to solve the problem of how to improve the identity verification efficiency in the case of multiple reserved fingerprints.
  • the user can input a fingerprint in the fingerprint input area.
  • the matching priority is determined for each fingerprint data in the preset fingerprint database. It should be noted that the matching priority may be used to represent the situation in which the user uses the reserved fingerprint.
  • each of the reserved fingerprints is determined to have a corresponding matching priority, and the matching priorities have a high and low order, and the matching order of the matching priorities may indicate that the user uses the priority order of the reserved fingerprints. The higher the matching priority, the more frequently the user uses the reserved fingerprint.
  • Step S103 According to the ranking of the matching priorities, the reserved fingerprints are matched with the fingerprints to be identified in order to obtain an identity verification result.
  • the reserved fingerprints are sequentially matched with the fingerprints to be recognized by the user according to the determined ranking of the matching priorities.
  • a reserved fingerprint matches the fingerprint to be identified. Then, a verification result indicating that the authentication is successful is generated, and the matching process is ended. If all the reserved fingerprints in the preset fingerprint database are matched, and there is no reserved fingerprint matching the fingerprint to be identified, a verification result indicating that the authentication fails is generated.
  • the identity verification method can prompt the user to input the fingerprint to be identified for identity verification in response to the user opening the operation of the identity verification program, and after the user inputs the fingerprint data to be identified.
  • the respective matching priorities of the preset fingerprints in the preset fingerprint database are determined, wherein the matching order of the matching priorities may indicate the priority order of the users for each reserved fingerprint, so that the matching priorities are sorted according to the level of each matching priority.
  • the respective reserved fingerprints are sequentially compared with the fingerprint to be identified, thereby obtaining the result of the identity verification.
  • the present embodiment does not randomly compare the reserved fingerprint with the fingerprint to be identified, but determines the comparison order of the reserved fingerprints according to the determined matching priority, taking into account the user's fingerprint. Usage, which increases the probability of obtaining authentication results with fewer matching times, which improves the efficiency of authentication and better user experience.
  • each reserved fingerprint in the preset fingerprint database is bound to a variable, and the variable stores the matching number of the reserved fingerprint.
  • the number of matches indicates the total number of times the reserved fingerprint matches the fingerprint to be recognized by the user before the authentication. It should be noted that the fingerprint to be identified herein is not the fingerprint to be recognized input by the user in step S102 in the above embodiment, but the fingerprint input by the user during the identity verification process before the execution of the embodiment.
  • step S102 in the foregoing embodiment in response to the user inputting the fingerprint to be recognized, and determining the matching priority of each reserved fingerprint in the preset fingerprint database may be the following step A1.
  • Step A1 In response to the user inputting the fingerprint to be identified, the matching priority of each of the reserved fingerprints is generated according to the order of the matching times of the reserved fingerprints.
  • the preset fingerprint database includes three reserved fingerprints: reserved fingerprint 1, reserved fingerprint 2, and reserved fingerprint 3, and the corresponding matching times are 13 times, 4 times, and 8 times, and three reserved fingerprints. Between the number of matches The order is high, low, 13, 8, and 4. Therefore, the matching priorities generated for the three reserved fingerprints are reserved fingerprint 1, reserved fingerprint 3 and reserved fingerprint 2, that is, the reserved fingerprint 1 has the highest matching priority, followed by the reserved fingerprint 3, and finally The fingerprint 2 is reserved, and in this order, the fingerprint data to be identified is sequentially compared.
  • the number of matching of multiple reserved fingerprints is the same, for example, the number of matches of the reserved fingerprint 1 and the reserved fingerprint 2 is 8.
  • the matching priority of the reserved fingerprint needs to be adjusted.
  • a method for adjusting the matching priority is to pre-record the time point at which each of the reserved fingerprints matches the fingerprint to be recognized by the user last time, according to the sequence of successful matching time points.
  • the matching priority of the reserved fingerprints with the same number of matches is adjusted.
  • step S102 in response to the user inputting the fingerprint to be recognized, the matching priority of each of the reserved fingerprints may be specifically included according to the order of the matching times of the reserved fingerprints.
  • steps S201 to S202 in response to the user inputting the fingerprint to be recognized, the matching priority of each of the reserved fingerprints may be specifically included according to the order of the matching times of the reserved fingerprints.
  • step S201 in response to the user inputting the fingerprint to be identified, the initial matching priority of each of the reserved fingerprints is determined according to the order of the matching times of the respective reserved fingerprints.
  • Step S202 If there is a case where the initial matching priorities are the same, the same initial matching priority is adjusted according to the sequence of the recorded time points.
  • the initial matching priority is determined according to the order of the matching times, and the initial matching priority is determined to be the same. If the same situation exists, the same initial matching priority is adjusted.
  • the adjustment method is in accordance with the order of the time points of the last matching success of each reserved fingerprint of the record. Specifically, the time point is prior, and the initial matching priority of the reserved fingerprint corresponding to the time point is raised.
  • the initial matching priority of the reserved fingerprint 2 and the reserved fingerprint 3 is the same, but the time when the last time the two matching the fingerprint to be identified is successful is 11:33, June 4, respectively. At 11:35, the time point for the fingerprint 2 is reserved before the fingerprint 3 is reserved. Therefore, the initial matching priority of the reserved fingerprint 2 is raised, so that the final matching priority is: reserved fingerprint 1 > reserved fingerprint 2> Reserved fingerprint 3.
  • the implementation manner can solve the problem of how to determine the matching priority in the case that the number of reserved fingerprint matching times is the same. Moreover, in the process of solving this problem, the case where the user recently uses each reserved fingerprint is considered. Because the order in which users use fingerprints is often determined by usage habits, the order of using fingerprints in the near future will prompt the matching priority in this authentication. Therefore, according to the order of time points, the adjustment is made. Matching priorities can improve the efficiency of authentication and the user experience is better.
  • the other way to adjust the matching priority may be to record the last reserved fingerprint matching the fingerprint to be recognized by the user, if the reserved fingerprint is exactly the same as other reservations. If the fingerprint is the same, the matching priority of the reserved fingerprint is adjusted.
  • step S102 in the foregoing embodiment in response to the user inputting the fingerprint to be recognized, the matching priority of each of the reserved fingerprints is generated according to the order of the matching times of the reserved fingerprints.
  • the following steps S301 to S302 may be specifically included.
  • step S301 in response to the user inputting the fingerprint to be identified, the initial matching priority of each of the reserved fingerprints is determined according to the order of the matching times of the respective reserved fingerprints.
  • the initial matching priority is determined according to the order of the number of reserved fingerprint matching times. For example, the matching times of the three reserved fingerprints (reserved fingerprint 1, reserved fingerprint 2, and reserved fingerprint 3) are 13 times, 8 times, and 8 times, respectively, and correspondingly, the initial matching priorities of the three reserved fingerprints are respectively.
  • Step S302 If the recorded initial fingerprint has the same initial matching priority as the other reserved fingerprints, the initial matching priority of the reserved fingerprint is increased.
  • the initial matching priority of the reserved fingerprint of the last matching success of the record is determined to be the same as that of the other reserved fingerprints.
  • the recorded fingerprint of the last matching success is the reserved fingerprint 3, and its initial matching priority is the same as that of the reserved fingerprint 2.
  • the manner of increasing may be: raising the initial matching priority of the reserved fingerprint to the previous digit of the same reserved fingerprint, such as raising the initial matching priority of the reserved fingerprint 3 to the reserved The previous digit of fingerprint 2, and thus the final matching priority is: reserved fingerprint 1 > reserved fingerprint 3 > reserved fingerprint 2.
  • the manner of raising may also be to raise the initial priority of the recorded reserved fingerprint to the highest, such as to reserve The initial matching priority of the fingerprint 3 is raised to the previous digit of the reserved fingerprint 1, so that the final matching priority is: reserved fingerprint 3> reserved fingerprint 1> reserved fingerprint 2.
  • the implementation manner can solve the problem of how to determine the matching priority in the case that the number of reserved fingerprint matching times is the same. Moreover, the implementation manner not only considers the total number of used fingerprints, but also considers the latest usage of the reserved fingerprints. According to the latest use of the reserved fingerprints, the matching priority in the current authentication is performed. Adjustment can improve the efficiency of authentication and better user experience.
  • the matching number of the reserved fingerprints matching the fingerprint to be identified is incremented by one to achieve matching of the reserved fingerprints. The number of updates.
  • step S101 to step S103 in FIG. 4 can refer to step S101 to step S103 in FIG. 1 described above, and details are not described herein. Only step S104 will be described below.
  • Step S104 If the identity verification result is a failure, display an alternate identity verification interface, so that the user performs identity verification on the candidate identity verification interface; wherein the candidate identity verification decryption includes password verification and decryption. Or graphics verification decryption.
  • an alternate authentication module can be invoked. Specifically, an alternate authentication interface, such as a password verification interface or a graphical verification interface, is displayed for the user to input data to be verified, such as a password or a graphic, in an alternative authentication interface, and invoke a corresponding alternative authentication module to complete Authentication.
  • an alternate authentication interface such as a password verification interface or a graphical verification interface
  • the identity verification method provided by this embodiment can be used for fingerprint identification.
  • the user is provided with an alternative alternative authentication scheme to enable the user to complete the authentication.
  • the following describes the authentication device provided by the present application. It should be noted that the description of the identity verification device can refer to the identity verification method provided above, and details are not described below.
  • the device embodiment may specifically include: a fingerprint input module 501 to be identified, a matching priority determining module 502, and a fingerprint matching module 503 to be identified; wherein:
  • the fingerprint input module 501 is configured to prompt the user to input the fingerprint to be recognized in response to the user opening the target program; wherein the target program is a program that needs to perform identity verification;
  • the matching priority determining module 502 is configured to determine, according to an operation of the user to input the fingerprint to be recognized, a matching priority of each reserved fingerprint in the preset fingerprint database, wherein the preset fingerprint database stores more reserved by the user.
  • the to-be-identified fingerprint matching module 503 is configured to perform the identity verification result by sequentially matching the reserved fingerprint with the to-be-identified fingerprint according to the matching of the matching priority levels.
  • the fingerprint input module 501 to be identified may perform an operation of the identity verification program in response to the user opening, prompting the user to input the fingerprint to be identified for identity verification, and After the fingerprint data to be identified is input, the matching priority determining module 502 determines the matching priority of each of the reserved fingerprints in the preset fingerprint database, wherein the matching of the matching priorities can indicate that the user preferentially uses the reserved fingerprints. The order is sorted according to the level of each matching priority, and the fingerprint matching module 503 to compare the respective reserved fingerprints with the fingerprint to be identified in order to obtain the result of the identity verification.
  • the present embodiment does not randomly compare the reserved fingerprint with the fingerprint to be identified, but determines the comparison order of the reserved fingerprints according to the determined matching priority, taking into account the user's fingerprint. Usage, which increases the probability of obtaining authentication results with fewer matching times, which improves the efficiency of authentication and better user experience.
  • Each of the reserved fingerprints in the preset fingerprint database has a respective number of matching times, and the number of matching times is used to indicate the total number of times the reserved fingerprint matches the fingerprint to be recognized by the user, and the corresponding number of times is successful;
  • the matching priority determining module 502 may specifically include:
  • the matching priority generation sub-module is configured to respond to the user inputting the fingerprint to be recognized, and generate a matching priority of each of the reserved fingerprints according to the order of the matching times of the reserved fingerprints.
  • the matching priority generation sub-module includes:
  • a first matching priority generation sub-module configured to determine an initial matching priority of each of the reserved fingerprints according to an operation of inputting a fingerprint to be recognized by a user, according to a ranking of the matching times of the respective reserved fingerprints;
  • the first matching priority adjustment sub-module is configured to adjust the same initial matching priority according to the sequence of the recorded time points if there is a case where the initial matching priorities are the same.
  • the reserved fingerprint that has been successfully matched with the fingerprint to be recognized by the user last time may be recorded in advance;
  • the matching priority generation submodule includes:
  • a second matching priority generation sub-module configured to determine an initial matching priority of each of the reserved fingerprints according to an operation of inputting a fingerprint to be recognized by a user, according to a ranking of the matching times of the reserved fingerprints;
  • the second matching priority adjustment sub-module is configured to increase the initial matching priority of the reserved fingerprint when the reserved fingerprint has the same initial matching priority as the other reserved fingerprints.
  • the device embodiment may further include: a fingerprint input module 501 to be identified, a matching priority determining module 502, a fingerprint matching module 503 to be identified, and an optional identity verification module 504; wherein: the fingerprint input module to be identified
  • a fingerprint input module 501 to be identified For description of the matching priority determining module 502 and the fingerprint matching module 503 to be identified, reference may be made to the description of FIG. 5, and details are not described herein.
  • An alternate authentication module 504 configured to display an alternate authentication interface for the user to perform identity verification on the alternate authentication interface if the authentication result is a failure; wherein the candidate identity
  • the verification interface is a password verification interface or a graphic verification interface.
  • the steps of a method or algorithm described in connection with the embodiments disclosed herein can be implemented directly in hardware, a software module executed by a processor, or a combination of both.
  • the software module can be placed in random access memory (RAM), memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or technical field. Any other form of storage medium known.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

本申请提供了身份验证方法实施例,本实施例响应于用户开启需要进行身份验证程序的操作,提示用户输入待识别指纹,在用户输入待识别指纹数据后,为预设指纹库中的各个预留指纹确定各自的匹配优先级,匹配优先级的高低排序表示用户对各个预留指纹的优先使用顺序,按照各个匹配优先级的高低排序,将各个预留指纹依次与待识别指纹进行比对,从而获得身份验证的结果。与现有技术相比,本实施例按照确定出的匹配优先级来确定预留指纹的比对顺序,考虑到了用户对指纹的使用情况,从而提高了使用较少匹配次数便获得身份验证结果的概率,即提高了身份验证效率,用户体验较好。本申请还提供了身份验证装置实施例,以保证上述方法的应用及实现。

Description

身份验证方法及装置
本申请要求申请日为2015年6月24日、申请号为201510353743.1、发明名称为“身份验证方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端技术领域,尤其是身份验证方法及装置。
背景技术
手机,已经成为人们日常生活中一种重要的通信工具。智能手机,不仅可以实现通话等基本通信功能,还可以安装各种财务类程序如支付宝,以及社交类程序如微信。这些应用程序在实现某些功能时,需要对用户的身份进行验证。
目前,比较常用的一种身份验证方式是,用户预存多个指纹数据,在身份验证时,将用户输入的待识别指纹,与预存的多个指纹数据随机进行比对,以完成身份验证。然而,该种身份验证方式,效率较低。
发明内容
有鉴于此,本申请提供了身份验证方法,用以提高身份验证的效率。另外,本申请还提供了身份验证装置,用以保证所述方法在实际中的应用及实现。
为实现所述目的,本申请提供的技术方案如下:
一种身份验证方法,包括:
响应用户开启目标程序的操作,提示用户输入待识别指纹;其中,所述目标程序为需要进行身份验证的程序;
响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级;其中,所述预设指纹库中保存有用户预留的多个指纹;
按照所述匹配优先级的高低排序,依次将所述预留指纹与所述待识别指纹进行匹配,获得身份验证结果。
可选地,上述的身份验证方法中,所述预设指纹库中的每个所述预留指纹 均具有各自的匹配次数,所述匹配次数用于表示预留指纹与用户输入的待识别指纹匹配成功的总次数;
相应地,所述响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级,包括:
响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级。
可选地,上述的身份验证方法预先记录有各个所述预留指纹最近一次与用户输入的待识别指纹匹配成功的时间点;
相应地,所述响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级,包括:
响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
若存在初始匹配优先级相同的情况,按照记录的所述时间点的先后顺序,调整相同的所述初始匹配优先级。
可选地,上述的身份验证方法预先记录有最近一次与用户输入的待识别指纹匹配成功的预留指纹;
相应地,所述响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级,包括:
响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
若记录的所述预留指纹与其他预留指纹的初始匹配优先级相同,升高记录的所述预留指纹的初始匹配优先级。
可选地,上述的身份验证方法还包括:
在所述身份验证结果为失败的情况下,显示备选身份验证界面,以供用户在所述备选身份验证界面进行身份验证;其中,所述备选身份验证界面为密码验证界面或图形验证界面。
本申请还提供了一种身份验证装置,包括:
待识别指纹输入模块,用于响应用户开启目标程序的操作,提示用户输入待识别指纹;其中,所述目标程序为需要进行身份验证的程序;
匹配优先级确定模块,用于响应用户输入待识别指纹的操作,确定预设指 纹库中的各个预留指纹的匹配优先级;其中,所述预设指纹库中保存有用户预留的多个指纹;
待识别指纹比对模块,用于按照所述匹配优先级的高低排序,依次将所述预留指纹与所述待识别指纹进行匹配,获得身份验证结果。
可选地,上述的身份验证装置中,所述预设指纹库中的每个所述预留指纹均具有各自的匹配次数,所述匹配次数用于表示预留指纹与用户输入的待识别指纹匹配成功的总次数;
相应地,所述匹配优先级确定模块包括:
匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级。
可选地,上述的身份验证装置预先记录有各个所述预留指纹最近一次与用户输入的待识别指纹匹配成功的时间点;
相应地,所述匹配优先级生成子模块包括:
第一匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
第一匹配优先级调整子模块,用于若存在初始匹配优先级相同的情况,按照记录的所述时间点的先后顺序,调整相同的所述初始匹配优先级。
可选地,上述的身份验证装置预先记录有最近一次与用户输入的待识别指纹匹配成功的预留指纹;
相应地,所述匹配优先级生成子模块包括:
第二匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
第二匹配优先级调整子模块,用于若记录的所述预留指纹与其他预留指纹的初始匹配优先级相同,升高记录的所述预留指纹的初始匹配优先级。
可选地,上述的身份验证装置还包括:
备选身份验证模块,用于在所述身份验证结果为失败的情况下,显示备选身份验证界面,以供用户在所述备选身份验证界面进行身份验证;其中,所述备选身份验证界面为密码验证界面或图形验证界面。
由以上的方案可知,本申请具有如下优点:
本申请提供的身份验证方法实施例,可以响应于用户开启需要进行身份验证程序的操作,提示用户输入用于身份验证的待识别指纹,且在用户输入待识别指纹数据后,为预设指纹库中的各个预留指纹确定各自的匹配优先级,其中,匹配优先级的高低排序可以表示用户对各个预留指纹的优先使用顺序,进而按照各个匹配优先级的高低排序,将各个预留指纹依次与待识别指纹进行比对,从而获得身份验证的结果。与现有技术相比,本实施例并非随机地将预留指纹与待识别指纹进行比对,而是按照确定出的匹配优先级来确定预留指纹的比对顺序,考虑到了用户对指纹的使用情况,从而提高了使用较少匹配次数便获得身份验证结果的概率,即提高了身份验证效率,用户体验较好。
当然,实施本申请的任一产品并不一定需要同时达到以上所述的所有优点。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本申请提供的身份验证方法一个实施例的流程图;
图2为本申请提供的确定匹配优先级的一种实现方式的流程图;
图3为本申请提供的确定匹配优先级的另一实现方式的流程图;
图4为本申请提供的身份验证方法另一实施例的流程图;
图5为本申请提供的身份验证装置一个实施例的结构示意图;
图6为本申请提供的身份验证装置另一实施例的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是 全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
参照图1,其示出了本申请提供的身份验证方法一个实施例的流程。该实施例可以但不限定应用在移动终端上,移动终端如手机、平板电脑、掌上电脑及便携式计算机等。如图1所示,该实施例可以具体包括步骤S101~步骤S103。
步骤S101:响应用户开启目标程序的操作,提示用户输入待识别指纹;其中,所述目标程序为需要进行身份验证的程序。
其中,移动终端上的某些程序在开启时,是需要身份验证的。如开机程序以及支付宝、微信等应用程序。为了便于描述,将用户开启的需要进行身份验证的程序称为目标程序。在用户开启目标程序时,本实施例提示用户输入用于识别的指纹,从而依据输入的指纹验证该用户是否为合法用户。同样,为了便于描述,可以将用户输入的指纹称为待识别指纹。
步骤S102:响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级;其中,所述预设指纹库中保存有用户预留的多个指纹。
在实际应用前,本实施例预先设置有指纹库,指纹库中保存有用户预留的指纹,且指纹为多个。需要说明的是,本实施例应用在利用多指纹对待识别指纹进行验证的场景中,解决的是在多个预留指纹的情况下,如何提高身份验证效率的问题。
用户在看到步骤S101生成的提示信息后,可以在指纹输入区域输入指纹。本实施例响应于用户的输入操作,为预设指纹库中的各个指纹数据,确定匹配优先级,需要说明的是,匹配优先级可以表征用户使用预留指纹的情况。
具体地,为每个预留指纹均确定各自对应的匹配优先级,匹配优先级之间具有高低排序,匹配优先级的高低排序可以表示用户使用预留指纹的优先顺序。匹配优先级越高,则表示用户越常使用该预留指纹。
步骤S103:按照所述匹配优先级的高低排序,依次将所述预留指纹与所述待识别指纹进行匹配,获得身份验证结果。
其中,按照确定出的匹配优先级的高低排序,将预留指纹依次与用户输入的待识别指纹进行匹配。
具体地,在依次匹配的过程中,若某个预留指纹与待识别指纹匹配成功, 则生成表示身份验证成功的验证结果,且结束匹配过程。若预设指纹库中的全部预留指纹均匹配完毕,且不存在与待识别指纹匹配成功的预留指纹,则生成表示身份验证失败的验证结果。
由以上的技术方案可知,本实施例提供的身份验证方法,可以响应于用户开启需要进行身份验证程序的操作,提示用户输入用于身份验证的待识别指纹,且在用户输入待识别指纹数据后,为预设指纹库中的各个预留指纹确定各自的匹配优先级,其中,匹配优先级的高低排序可以表示用户对各个预留指纹的优先使用顺序,从而按照各个匹配优先级的高低排序,将各个预留指纹依次与待识别指纹进行比对,从而获得身份验证的结果。与现有技术相比,本实施例并非随机地将预留指纹与待识别指纹进行比对,而是按照确定出的匹配优先级来确定预留指纹的比对顺序,考虑到了用户对指纹的使用情况,从而提高了使用较少匹配次数便获得身份验证结果的概率,即提高了身份验证效率,用户体验较好。
在实际应用中,预设指纹库中的各个预留指纹均各自绑定有一个变量,变量存储的是预留指纹的匹配次数。匹配次数表示的是在本次身份验证前,预留指纹与用户输入的待识别指纹匹配成功的总次数。需要说明的是,此处的待识别指纹并非上述实施例中步骤S102用户输入的待识别指纹,而是在本实施例执行之前,用户进行身份验证过程中输入的指纹。
在该种场景中,上述实施例中的步骤S102响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级的具体实现方式可以为下述步骤A1。
步骤A1:响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级。
其中,各个预留指纹的匹配次数之间存在高低排序的内在关系。按照预留指纹的匹配次数之间的高低排序,为每个预留指纹生成各自的匹配优先级。按照生成的匹配优先级,便可确定出预留指纹与待识别指纹数据匹配的优先顺序。
例如,预设指纹库中包含三个预留指纹:预留指纹1、预留指纹2及预留指纹3,分别对应的匹配次数为13次、4次及8次,三个预留指纹的匹配次数之间 高低排序为13、8及4。从而,为三个预留指纹生成的匹配优先级依次为预留指纹1、预留指纹3及预留指纹2,即预留指纹1的匹配优先级最高、其次为预留指纹3,最后为预留指纹2,按照这个顺序,依次与待识别指纹数据进行比对。
在实际应用中,进行某次身份验证时,可能存在这样一种情况:多个预留指纹的匹配次数相同,如预留指纹1及预留指纹2的匹配次数均为8。此时,生成预留指纹的匹配优先级时,需要对匹配优先级进行调整。
具体地,对匹配优先级进行调整的一种方式是,预先记录有各个所述预留指纹最近一次与用户输入的待识别指纹匹配成功的时间点,按照匹配成功的时间点的先后顺序,对相同匹配次数的预留指纹的匹配优先级进行调整。
如图2所示,上述实施例中的步骤S102响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级可以具体包括以下步骤S201~步骤S202。
步骤S201:响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级。
其中,首先按照预留指纹匹配次数的排序,确定出初始匹配优先级。例如,三个预留指纹(预留指纹1、预留指纹2及预留指纹3)的匹配次数分别为13、8及8,相应地,三个预留指纹的初始匹配优先级为:预留指纹1的初始匹配优先级最高,预留指纹2及预留指纹3的初始匹配优先级相同且低于预留指纹1,即预留指纹1>预留指纹2=预留指纹3。
步骤S202:若存在初始匹配优先级相同的情况,按照记录的所述时间点的先后顺序,调整相同的所述初始匹配优先级。
其中,按照匹配次数的高低顺序,确定出初始匹配优先级后,判断初始匹配优先级是否相同,若存在相同的情况,则对相同的初始匹配优先级进行调整。调整的方式,是按照记录的各个预留指纹的最近一次匹配成功的时间点先后顺序。具体地,时间点在先,则升高该时间点对应的预留指纹的初始匹配优先级。
在上一示例中,预留指纹2及预留指纹3的初始匹配优先级相同,但两者最近一次与待识别指纹匹配成功的时间点分别为6月4日11点33分、6月4日11点35分,预留指纹2的时间点在预留指纹3之前,因此,升高预留指纹2的初始匹配优先级,从而最终的匹配优先级为:预留指纹1>预留指纹2>预留指纹3。
由以上的技术方案可知,该种实现方式可以解决预留指纹匹配次数相同的情况下,如何确定匹配优先级的问题。并且,在解决该问题过程中,考虑到用户近期使用各个预留指纹的情况。由于,用户使用指纹的顺序往往是由使用习惯决定的,所以,近期使用预留指纹的顺序,会对本次身份验证中确定匹配优先级进行提示,因此,根据时间点的先后顺序调整后的匹配优先级,可以提高身份验证的效率,用户体验较好。
存在匹配优先级相同的情况下,对匹配优先级进行调整的另一种方式可以是,记录最近一次与用户输入的待识别指纹进行匹配的预留指纹,若该预留指纹正好与其他预留指纹相同,则调整该预留指纹的匹配优先级。
具体地,如图3所示,上述实施例中的步骤S102响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级可以具体包括以下步骤S301~步骤S302。
步骤S301:响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级。
其中,首先按照预留指纹匹配次数的排序,确定出初始匹配优先级。例如,三个预留指纹(预留指纹1、预留指纹2及预留指纹3)的匹配次数分别为13次、8次及8次,相应地,三个预留指纹的初始匹配优先级为:预留指纹1的初始匹配优先级最高,预留指纹2及预留指纹3的初始匹配优先级相同且低于预留指纹1,即预留指纹1>预留指纹2=预留指纹3。
步骤S302:若记录的所述预留指纹与其他预留指纹的初始匹配优先级相同,升高记录的所述预留指纹的初始匹配优先级。
其中,判断记录的最近一次匹配成功的预留指纹的初始匹配优先级是否与其他预留指纹的相同。例如,记录的最近一次匹配成功的预留指纹为预留指纹3,其初始匹配优先级与预留指纹2的相同。
因此,升高记录的该最近一次匹配成功的预留指纹的初始匹配优先级。其中,升高的方式可以是,将记录的该预留指纹的初始匹配优先级升高至相同的预留指纹的前一位,如将预留指纹3的初始匹配优先级升高至预留指纹2的前一位,从而最终的匹配优先级为:预留指纹1>预留指纹3>预留指纹2。或者,升高的方式还可以是,将记录的该预留指纹的初始优先级升高至最高,如将预留 指纹3的初始匹配优先级升高至预留指纹1的前一位,从而最终的匹配优先级为:预留指纹3>预留指纹1>预留指纹2。
由以上的技术方案可知,该种实现方式可以解决预留指纹匹配次数相同的情况下,如何确定匹配优先级的问题。并且,该种实现方式不仅考虑到预留指纹的使用总次数,还考虑到了预留指纹的最近一次使用情况,根据最近一次使用预留指纹的情况,对本次身份验证中的匹配优先级进行调整,可以调高身份验证效率,用户体验更好。
需要说明的是,在实际应用中,还可能存在两个以上预留指纹的匹配次数相同的情况,这样,升高某个预留指纹的初始优先级后,对其他相同的预留指纹再进行排序。排序的方式可以随机,或者,记录有每个预留指纹最近一次匹配成功的时间点,按照最近一次时间点的先后排序,对其他相同的预留指纹进行排序。
为了保存每个预留指纹的匹配次数,在每次身份验证中,若身份验证结果为成功,则将与待识别指纹匹配成功的预留指纹的匹配次数加1,实现对预留指纹的匹配次数的更新。
参照图4,其示出了本申请提供的身份验证方法另一实施例的流程。如图4所示,在上述图1基础上,本实施例还可以包括步骤S104。需要说明的是,图4中的步骤S101至步骤S103可以参照上述图1中的步骤S101至步骤S103,此处并不赘述,以下仅对步骤S104进行说明。
步骤S104:在所述身份验证结果为失败的情况下,显示备选身份验证界面,以使用户在所述备选身份验证界面进行身份验证;其中,所述备选身份验证解密包括密码验证解密或图形验证解密。
其中,在获得身份验证结果后,判断身份验证结果为成功还是失败。若身份验证结果为失败,为了完成身份验证过程,则可以调用备选身份验证模块。具体地,显示备选身份验证界面,如密码验证界面或图形验证界面,以供用户在备选身份验证界面输入待验证的数据,如密码或图形,调用相应的备选身份验证模块,以完成身份验证。
由以上的技术方案可知,本实施例提供的身份验证方法,可以在指纹识别 为失败的情况下,提供给用户其他的备选身份验证方案,以使用户完成身份验证。
下面对本申请提供的身份验证装置进行介绍,需要说明的是,有关身份验证装置的说明可参照上文提供的身份验证方法,以下并不做赘述。
参照图5,其示出了本申请提供的身份验证装置一个实施例的结构。如图5所示,该装置实施例可以具体包括:待识别指纹输入模块501、匹配优先级确定模块502及待识别指纹比对模块503;其中:
待识别指纹输入模块501,用于响应用户开启目标程序的操作,提示用户输入待识别指纹;其中,所述目标程序为需要进行身份验证的程序;
匹配优先级确定模块502,用于响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级;其中,所述预设指纹库中保存有用户预留的多个指纹;
待识别指纹比对模块503,用于按照所述匹配优先级的高低排序,依次将所述预留指纹与所述待识别指纹进行匹配,获得身份验证结果。
由以上技术方案可知,本实施例提供的身份验证装置中,待识别指纹输入模块501可以响应于用户开启需要进行身份验证程序的操作,提示用户输入用于身份验证的待识别指纹,且在用户输入待识别指纹数据后,匹配优先级确定模块502为预设指纹库中的各个预留指纹确定各自的匹配优先级,其中,匹配优先级的高低排序可以表示用户对各个预留指纹的优先使用顺序,从而按照各个匹配优先级的高低排序,待识别指纹比对模块503将各个预留指纹依次与待识别指纹进行比对,从而获得身份验证的结果。与现有技术相比,本实施例并非随机地将预留指纹与待识别指纹进行比对,而是按照确定出的匹配优先级来确定预留指纹的比对顺序,考虑到了用户对指纹的使用情况,从而提高了使用较少匹配次数便获得身份验证结果的概率,即提高了身份验证效率,用户体验较好。
所述预设指纹库中的每个所述预留指纹均具有各自的匹配次数,所述匹配次数用于表示预留指纹与用户输入的待识别指纹匹配成功的总次数;相应地,所述匹配优先级确定模块502可以具体包括:
匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级。
具体地,可以预先记录有各个所述预留指纹最近一次与用户输入的待识别指纹匹配成功的时间点;相应地,所述匹配优先级生成子模块包括:
第一匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
第一匹配优先级调整子模块,用于若存在初始匹配优先级相同的情况,按照记录的所述时间点的先后顺序,调整相同的所述初始匹配优先级。
另外,可以预先记录有最近一次与用户输入的待识别指纹匹配成功的预留指纹;
相应地,所述匹配优先级生成子模块包括:
第二匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
第二匹配优先级调整子模块,用于若记录的所述预留指纹与其他预留指纹的初始匹配优先级相同,升高记录的所述预留指纹的初始匹配优先级。
参照图6,其示出了本申请提供的身份验证装置另一实施例的结构。如图6所示,该装置实施例可以具体包括:待识别指纹输入模块501、匹配优先级确定模块502、待识别指纹比对模块503及备选身份验证模块504;其中:待识别指纹输入模块501、匹配优先级确定模块502、待识别指纹比对模块503的说明可参照图5所述的说明,此处并不赘述。
备选身份验证模块504,用于在所述身份验证结果为失败的情况下,显示备选身份验证界面,以供用户在所述备选身份验证界面进行身份验证;其中,所述备选身份验证界面为密码验证界面或图形验证界面。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较 简单,相关之处参见方法部分说明即可。
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
结合本文中所公开的实施例描述的方法或算法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本发明。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种身份验证方法,其特征在于,包括:
    响应用户开启目标程序的操作,提示用户输入待识别指纹;其中,所述目标程序为需要进行身份验证的程序;
    响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级;其中,所述预设指纹库中保存有用户预留的多个指纹;
    按照所述匹配优先级的高低排序,依次将所述预留指纹与所述待识别指纹进行匹配,获得身份验证结果。
  2. 根据权利要求1所述的身份验证方法,其特征在于,所述预设指纹库中的每个所述预留指纹均具有各自的匹配次数,所述匹配次数用于表示预留指纹与用户输入的待识别指纹匹配成功的总次数;
    相应地,所述响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级,包括:
    响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级。
  3. 根据权利要求2所述的身份验证方法,其特征在于,预先记录有各个所述预留指纹最近一次与用户输入的待识别指纹匹配成功的时间点;
    相应地,所述响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级,包括:
    响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
    若存在初始匹配优先级相同的情况,按照记录的所述时间点的先后顺序,调整相同的所述初始匹配优先级。
  4. 根据权利要求2所述的身份验证方法,其特征在于,预先记录有最近一次与用户输入的待识别指纹匹配成功的预留指纹;
    相应地,所述响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级,包括:
    响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
    若记录的所述预留指纹与其他预留指纹的初始匹配优先级相同,升高记录的所述预留指纹的初始匹配优先级。
  5. 根据权利要求1所述的身份验证方法,其特征在于,还包括:
    在所述身份验证结果为失败的情况下,显示备选身份验证界面,以供用户在所述备选身份验证界面进行身份验证;其中,所述备选身份验证界面为密码验证界面或图形验证界面。
  6. 一种身份验证装置,其特征在于,包括:
    待识别指纹输入模块,用于响应用户开启目标程序的操作,提示用户输入待识别指纹;其中,所述目标程序为需要进行身份验证的程序;
    匹配优先级确定模块,用于响应用户输入待识别指纹的操作,确定预设指纹库中的各个预留指纹的匹配优先级;其中,所述预设指纹库中保存有用户预留的多个指纹;
    待识别指纹比对模块,用于按照所述匹配优先级的高低排序,依次将所述预留指纹与所述待识别指纹进行匹配,获得身份验证结果。
  7. 根据权利要求6所述的身份验证装置,其特征在于,所述预设指纹库中的每个所述预留指纹均具有各自的匹配次数,所述匹配次数用于表示预留指纹与用户输入的待识别指纹匹配成功的总次数;
    相应地,所述匹配优先级确定模块包括:
    匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,生成各个所述预留指纹的匹配优先级。
  8. 根据权利要求7所述的身份验证装置,其特征在于,预先记录有各个所述预留指纹最近一次与用户输入的待识别指纹匹配成功的时间点;
    相应地,所述匹配优先级生成子模块包括:
    第一匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
    第一匹配优先级调整子模块,用于若存在初始匹配优先级相同的情况,按照记录的所述时间点的先后顺序,调整相同的所述初始匹配优先级。
  9. 根据权利要求7所述的身份验证装置,其特征在于,预先记录有最近一次与用户输入的待识别指纹匹配成功的预留指纹;
    相应地,所述匹配优先级生成子模块包括:
    第二匹配优先级生成子模块,用于响应用户输入待识别指纹的操作,依据各个所述预留指纹的匹配次数的高低排序,确定各个所述预留指纹的初始匹配优先级;
    第二匹配优先级调整子模块,用于若记录的所述预留指纹与其他预留指纹的初始匹配优先级相同,升高记录的所述预留指纹的初始匹配优先级。
  10. 根据权利要求6所述的身份验证装置,其特征在于,还包括:
    备选身份验证模块,用于在所述身份验证结果为失败的情况下,显示备选身份验证界面,以供用户在所述备选身份验证界面进行身份验证;其中,所述备选身份验证界面为密码验证界面或图形验证界面。
PCT/CN2015/083201 2015-06-24 2015-07-02 身份验证方法及装置 WO2016206132A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510353743.1 2015-06-24
CN201510353743.1A CN105631278A (zh) 2015-06-24 2015-06-24 身份验证方法及装置

Publications (1)

Publication Number Publication Date
WO2016206132A1 true WO2016206132A1 (zh) 2016-12-29

Family

ID=56046204

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/083201 WO2016206132A1 (zh) 2015-06-24 2015-07-02 身份验证方法及装置

Country Status (2)

Country Link
CN (1) CN105631278A (zh)
WO (1) WO2016206132A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472393A (zh) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 基于生物识别的信息显示方法、装置、存储介质和设备

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096549A (zh) * 2016-06-07 2016-11-09 青岛海信移动通信技术股份有限公司 一种指纹匹配方法和终端
CN105912919B (zh) * 2016-06-17 2018-03-27 广东欧珀移动通信有限公司 一种指纹解锁方法及终端
CN106203319B (zh) * 2016-07-05 2019-07-02 北京小米移动软件有限公司 指纹匹配方法和装置
CN106650625A (zh) * 2016-11-16 2017-05-10 模蒂乐(北京)科技发展有限公司 用于指纹锁的快速指纹比对方法及装置
CN106557761A (zh) * 2016-11-29 2017-04-05 深圳天珑无线科技有限公司 一种指纹识别的方法及装置
CN108205616A (zh) * 2016-12-16 2018-06-26 北京小米移动软件有限公司 身份信息校验方法及装置
CN107134022B (zh) * 2017-05-03 2019-10-18 陈卫东 用于考勤机的身份识别方法
CN107491965B (zh) 2017-07-31 2020-07-10 阿里巴巴集团控股有限公司 一种生物特征库的建立方法和装置
JP2019101785A (ja) * 2017-12-04 2019-06-24 株式会社東海理化電機製作所 車載装置
CN111583459A (zh) * 2020-04-28 2020-08-25 德施曼机电(中国)有限公司 基于虹膜检测的智能门锁系统
CN111554014A (zh) * 2020-05-30 2020-08-18 德施曼机电(中国)有限公司 人脸识别门锁系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040038553A (ko) * 2002-11-01 2004-05-08 한국전자통신연구원 지문 영상의 전역적 정보 및 지역적 특성 정보의 조합을이용한 지문 인증방법
CN1689042A (zh) * 2003-01-28 2005-10-26 富士通株式会社 生物测量信息登记装置、生物测量信息校验装置、生物测量信息登记/校验系统和生物测量信息登记程序
CN103324886A (zh) * 2013-06-05 2013-09-25 中国科学院计算技术研究所 一种网络攻击检测中指纹库的提取方法和系统
CN103886239A (zh) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 一种移动终端应用程序的用户鉴权方法和装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4612398B2 (ja) * 2004-11-11 2011-01-12 Necインフロンティア株式会社 照合装置および照合方法
CN102081501A (zh) * 2011-01-19 2011-06-01 宇龙计算机通信科技(深圳)有限公司 提供用户快捷操作应用程序的方法、装置及移动终端
CN103729356B (zh) * 2012-10-11 2016-10-12 腾讯科技(深圳)有限公司 网页地址提示方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040038553A (ko) * 2002-11-01 2004-05-08 한국전자통신연구원 지문 영상의 전역적 정보 및 지역적 특성 정보의 조합을이용한 지문 인증방법
CN1689042A (zh) * 2003-01-28 2005-10-26 富士通株式会社 生物测量信息登记装置、生物测量信息校验装置、生物测量信息登记/校验系统和生物测量信息登记程序
CN103324886A (zh) * 2013-06-05 2013-09-25 中国科学院计算技术研究所 一种网络攻击检测中指纹库的提取方法和系统
CN103886239A (zh) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 一种移动终端应用程序的用户鉴权方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472393A (zh) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 基于生物识别的信息显示方法、装置、存储介质和设备

Also Published As

Publication number Publication date
CN105631278A (zh) 2016-06-01

Similar Documents

Publication Publication Date Title
WO2016206132A1 (zh) 身份验证方法及装置
US11637824B2 (en) Multi-factor authentication devices
US10496804B2 (en) Fingerprint authentication method and system, and terminal supporting fingerprint authentication
US11805121B2 (en) Authentication system
US10432621B2 (en) Toggling biometric authentication
US9912657B2 (en) Adaptive multi-factor authentication system
US11055397B2 (en) Methods, mediums, and systems for establishing and using security questions
US9762573B2 (en) Biometric framework allowing independent application control
TWI728261B (zh) 判定認證能力之查詢系統、方法及非暫態機器可讀媒體
WO2017032008A1 (zh) 一种应用启动方法及移动终端
US20150040193A1 (en) Physical Interaction Style Based User Authentication for Mobile Computing Devices
US8875279B2 (en) Passwords for touch-based platforms using time-based finger taps
US20210266171A1 (en) Method and system for operating internet of things device
US9485255B1 (en) Authentication using remote device locking
WO2019047148A1 (zh) 一种密码验证方法、终端、计算机可读存储介质
US9721087B1 (en) User authentication
US8752144B1 (en) Targeted biometric challenges
US11902275B2 (en) Context-based authentication of a user
US20190139009A1 (en) Management system, control method therefor, and non-transitory computer-readable medium
CN106921626B (zh) 一种用户注册方法及装置
US10460094B2 (en) Method, apparatus, and storage medium for data processing
US20240187406A1 (en) Context-based authentication of a user
TWI590093B (zh) 動態驗證方法及相關電腦系統
WO2020192260A2 (zh) 指纹认证方法、设备及计算机可读存储介质
KR101559271B1 (ko) 보안 깊이 값을 이용한 보안 인증 처리방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15896027

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15896027

Country of ref document: EP

Kind code of ref document: A1