WO2017031888A1 - 指纹识别方法及装置 - Google Patents

指纹识别方法及装置 Download PDF

Info

Publication number
WO2017031888A1
WO2017031888A1 PCT/CN2015/098857 CN2015098857W WO2017031888A1 WO 2017031888 A1 WO2017031888 A1 WO 2017031888A1 CN 2015098857 W CN2015098857 W CN 2015098857W WO 2017031888 A1 WO2017031888 A1 WO 2017031888A1
Authority
WO
WIPO (PCT)
Prior art keywords
security level
fingerprint
fingerprint verification
verification security
obtaining
Prior art date
Application number
PCT/CN2015/098857
Other languages
English (en)
French (fr)
Inventor
江忠胜
陶钧
刘丹
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Priority to JP2017535957A priority Critical patent/JP2017537414A/ja
Priority to KR1020167004809A priority patent/KR101772829B1/ko
Priority to RU2016122619A priority patent/RU2643473C2/ru
Priority to MX2016003774A priority patent/MX362444B/es
Publication of WO2017031888A1 publication Critical patent/WO2017031888A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor
    • G06V40/1306Sensors therefor non-optical, e.g. ultrasonic or capacitive sensing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • G06V40/1359Extracting features related to ridge properties; Determining the fingerprint type, e.g. whorl or loop
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Definitions

  • the present disclosure relates to the field of communications technologies, and in particular, to a fingerprint identification method and apparatus.
  • the mobile phone has a fingerprint recognition virtual button, and the user can perform fingerprint recognition by touching the virtual button, thereby completing the unlocking operation.
  • the current fingerprint recognition virtual button is implemented by setting the fingerprint recognition sensor under the glass cover. When the user touches the glass cover, the fingerprint recognition sensor recognizes the finger signal and then performs fingerprint recognition.
  • the fingerprint recognition sensor is located below the glass cover, the sensitivity of the fingerprint recognition sensor is poor, and the fingerprint recognition rate is low.
  • the present disclosure provides a fingerprint identification method and apparatus.
  • a fingerprint identification method including:
  • the obtaining the current application environment information, and obtaining the feature threshold corresponding to the fingerprint verification security level according to the current application environment information includes:
  • the method further includes:
  • the obtaining, by the current application identifier, a feature threshold corresponding to a fingerprint verification security level of the current application including:
  • the method further includes:
  • the obtaining the current application environment information, and obtaining the feature threshold corresponding to the fingerprint verification security level according to the current application environment information includes:
  • the method further includes:
  • the obtaining, by the current system environment information, a feature threshold corresponding to a fingerprint verification security level of the current system environment including:
  • the method further includes:
  • a fingerprint identification apparatus including:
  • Obtaining an extraction module configured to acquire a fingerprint image, and extract feature information of the fingerprint image
  • Obtaining a module configured to obtain current application environment information, and obtain a feature threshold corresponding to the fingerprint verification security level according to the current application environment information;
  • the comparison identification module is configured to compare the feature information extracted by the acquisition extraction module with the pre-stored verification feature information, and if the comparison result reaches the corresponding feature threshold obtained by the obtaining module, the fingerprint If the recognition is successful, if the comparison result does not reach the corresponding feature threshold, the fingerprint recognition fails.
  • the obtaining module comprises:
  • the first obtaining submodule is configured to obtain a current application identifier, and obtain a feature threshold corresponding to a fingerprint verification security level of the current application according to the current application identifier.
  • the apparatus further includes:
  • the first receiving module is configured to receive the fingerprint verification by the user for different application settings before the first obtaining sub-module obtains the feature threshold corresponding to the fingerprint verification security level of the current application according to the current application identifier a security level and the characteristic threshold set for different fingerprint verification security levels;
  • a first saving module configured to save a first correspondence between different application identifiers received by the first receiving module and the fingerprint verification security level, and save the different fingerprint verification security levels and the feature thresholds The second correspondence.
  • the first obtaining submodule comprises:
  • a first security level obtaining unit configured to obtain a fingerprint verification security level of the current application according to the current application identifier and the first correspondence relationship
  • a first feature threshold obtaining unit configured to obtain a fingerprint verification security level of the current application according to the fingerprint verification security level of the current application obtained by the first security level obtaining unit and the second correspondence relationship Corresponding feature threshold.
  • the apparatus further includes:
  • the first prompt information display module is configured to display prompt information before the first receiving module receives the fingerprint verification security level set by the user for different applications and the feature threshold set for different fingerprint verification security levels, Prompting the user to set the fingerprint verification security level for the application;
  • the first receiving display module is configured to receive a triggering operation of the user, and display a fingerprint verification security level setting page according to the triggering operation.
  • the obtaining module comprises:
  • the second obtaining sub-module is configured to obtain current system environment information, and obtain a feature threshold corresponding to the fingerprint verification security level of the current system environment according to the current system environment information.
  • the apparatus further includes:
  • the second receiving module is configured to receive the fingerprint verification set by the user for different system environments before the second obtaining sub-module obtains the feature threshold corresponding to the fingerprint verification security level of the current system environment according to the current system environment information. a security level and the characteristic threshold set for different fingerprint verification security levels;
  • a second saving module configured to save a first correspondence between different system environment information received by the second receiving module and the fingerprint verification security level, and save the different fingerprint verification security level and the feature threshold The second correspondence.
  • the second obtaining submodule comprises:
  • a second security level obtaining unit configured to obtain a fingerprint verification security level of the current system environment according to the current system environment information and the first correspondence relationship
  • a second feature threshold obtaining unit configured to obtain a fingerprint verification security level of the current system environment according to the fingerprint verification security level of the current system environment obtained by the second security level obtaining unit and the second correspondence relationship Corresponding feature threshold.
  • the apparatus further includes:
  • a second prompt information display module configured to display prompt information to prompt the user before the receiving the user's fingerprint verification security level set for different system environments and the feature threshold set for different fingerprint verification security levels
  • the system environment sets the fingerprint verification security level
  • the second receiving display module is configured to receive a triggering operation of the user, and display a fingerprint verification security level setting page according to the triggering operation.
  • a fingerprint identification apparatus including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: obtaining the current application environment information, and obtaining a feature threshold corresponding to the fingerprint verification security level according to the current application environment information, and then performing according to the extracted feature information and the corresponding feature threshold.
  • Fingerprint recognition enables the fingerprint identification process to be completed according to the feature threshold corresponding to the fingerprint verification security level, thereby improving the fingerprint recognition rate.
  • a way to obtain a feature threshold is provided to provide conditions for fingerprint recognition.
  • the condition for obtaining the feature threshold is provided by saving the first correspondence of different application identifiers and fingerprint verification security levels and the second correspondence between different fingerprint verification security levels and feature thresholds.
  • a feature threshold corresponding to the fingerprint verification security level of the current application may be obtained.
  • the user can directly set the fingerprint verification security level for different applications on the fingerprint verification security level setting page, without requiring the user to enter the fingerprint verification by other means.
  • the security level setting page is easy to operate.
  • Providing another way to obtain the feature threshold provides a condition for fingerprint recognition.
  • the condition for obtaining the feature threshold is provided by preserving the first correspondence between the different system environment information and the fingerprint verification security level and the second correspondence between the different fingerprint verification security levels and the feature threshold.
  • a feature threshold corresponding to the fingerprint verification security level of the current system environment may be obtained.
  • the user can directly set the fingerprint verification security level for different system environments on the fingerprint verification security level setting page, without requiring the user to enter the fingerprint verification security level setting page by other means, and the operation is simple.
  • FIG. 1 is a flowchart of a fingerprint identification method according to an exemplary embodiment.
  • FIG. 2 is a flow chart showing obtaining a feature threshold, according to an exemplary embodiment.
  • FIG. 3 is a flow chart showing another method of obtaining a feature threshold, according to an exemplary embodiment.
  • FIG. 4a is a schematic diagram 1 of an interface of a mobile terminal according to an exemplary embodiment.
  • FIG. 4b is a schematic diagram 2 of an interface of a mobile terminal according to an exemplary embodiment.
  • FIG. 5 is a flow chart showing still obtaining a feature threshold according to an exemplary embodiment.
  • FIG. 6 is a flow chart showing still another method of obtaining a feature threshold, according to an exemplary embodiment.
  • FIG. 7a is a third schematic diagram of an interface of a mobile terminal according to an exemplary embodiment.
  • FIG. 7b is a schematic diagram 4 of an interface of a mobile terminal according to an exemplary embodiment.
  • FIGS. 8a-8c are scene diagrams of a fingerprint recognition method, according to an exemplary embodiment.
  • FIG. 9 is a block diagram of a fingerprint identification apparatus, according to an exemplary embodiment.
  • FIG. 10 is a block diagram of another fingerprint recognition apparatus, according to an exemplary embodiment.
  • FIG. 11 is a block diagram of another fingerprint recognition apparatus, according to an exemplary embodiment.
  • FIG. 12 is a block diagram of another fingerprint recognition apparatus, according to an exemplary embodiment.
  • FIG. 13 is a block diagram of another fingerprint recognition apparatus, according to an exemplary embodiment.
  • FIG. 14 is a block diagram of a fingerprint recognition apparatus, according to an exemplary embodiment.
  • FIG. 1 is a flowchart of a fingerprint identification method according to an exemplary embodiment.
  • the fingerprint identification method may be applied to a mobile terminal, where the mobile terminal may include a terminal such as a mobile phone or a tablet computer.
  • the method may include the following steps S101-S103:
  • step S101 a fingerprint image is acquired, and feature information of the fingerprint image is extracted.
  • the fingerprint recognition circuit of the mobile terminal can acquire the fingerprint image of the user, preprocess the fingerprint image, and then preprocess the fingerprint image. Feature information of the fingerprint image is extracted from the fingerprint image.
  • step S102 the current application environment information is obtained, and the feature threshold corresponding to the fingerprint verification security level is obtained according to the current application environment information.
  • the current application environment information may be an application identifier, or may be current system environment information, for example, whether the current mobile phone system is in a lock screen state or the like.
  • the fingerprint identification circuit can obtain the current application environment information, for example, obtain the current application identifier, and obtain a feature threshold corresponding to the fingerprint verification security level of the current application according to the current application identifier; for example, the current The system environment information is obtained, and the feature threshold corresponding to the fingerprint verification security level of the current system environment is obtained according to the current system environment information.
  • the different application environment information may have different fingerprint verification security levels, and different fingerprint verification security levels may have different feature thresholds.
  • the fingerprint verification security level of the screen wake-up unlocking may be the first level
  • the fingerprint verification security level of the fingerprint payment may be the fourth level, wherein the first level is less than the fourth level.
  • the feature threshold of the first level may be 0.6
  • the feature threshold of the fourth level may be 1.
  • step S103 the extracted feature information is compared with the pre-stored verification feature information. If the comparison result reaches the corresponding feature threshold, the fingerprint recognition is successful, and if the comparison result does not reach the corresponding feature threshold, the fingerprint recognition fails. .
  • the verification feature information for verifying whether the fingerprint information is correct is saved in the mobile terminal before fingerprint recognition.
  • the extracted feature information may be compared with the pre-stored verification feature information, and if the comparison result reaches the corresponding feature threshold, the fingerprint identification is performed. If the comparison result does not reach the corresponding feature threshold, the fingerprint recognition fails.
  • the pre-stored verification feature information includes five features.
  • the current application's fingerprint verification security level is the first level, and the corresponding feature threshold is 0.6. If the extracted feature information is compared with the verification feature information, three of them are found. If the feature matching is successful, that is, the comparison result reaches the corresponding feature threshold, it is determined that the fingerprint recognition is successful; The feature information is compared with the verification feature information, and it is found that the two features are successfully matched, that is, the comparison result does not reach the corresponding feature threshold, and the fingerprint recognition failure is determined.
  • the fingerprint identification method embodiment obtains the current application environment information, obtains a feature threshold corresponding to the fingerprint verification security level according to the current application environment information, and then performs fingerprint identification according to the extracted feature information and the corresponding feature threshold, so that the fingerprint identification process can be performed.
  • the fingerprint threshold is verified according to the feature threshold corresponding to the security level of the fingerprint, thereby improving the fingerprint recognition rate.
  • FIG. 2 is a flow chart showing obtaining a feature threshold according to an exemplary embodiment. As shown in FIG. 2, the process may include the following steps S201-S205:
  • step S201 a fingerprint verification security level set by the user for different applications and a feature threshold set for different fingerprint verification security levels are received.
  • the user can set the fingerprint verification security level for different applications, and can also set the feature threshold for different fingerprint verification security levels.
  • the applications A-D can be set to the first level
  • the applications E, G can be set to the second level
  • the application F can be set to the third level
  • the feature threshold of the first level may be set to 0.6
  • the feature threshold of the second level may be set to 0.8
  • the feature threshold of the third level may be set to 0.9.
  • step S202 a first correspondence between different application identifiers and a fingerprint verification security level is saved, and a second correspondence relationship between different fingerprint verification security levels and feature thresholds is saved.
  • the first correspondence relationship between different application identifiers and fingerprint verification security levels and different fingerprint verification security levels and The second correspondence of the feature thresholds after setting the fingerprint verification security level of different applications and the feature thresholds of different fingerprint verification security levels, the first correspondence relationship between different application identifiers and fingerprint verification security levels and different fingerprint verification security levels and The second correspondence of the feature thresholds.
  • step S203 the current application identification is obtained.
  • the fingerprint identification IC circuit of the mobile terminal can obtain the current application identification.
  • step S204 the fingerprint verification security level of the current application is obtained according to the current application identifier and the first correspondence.
  • the fingerprint verification security level of the current application may be obtained according to the obtained current application identifier and the saved first correspondence.
  • step S205 according to the fingerprint verification security level and the second correspondence relationship of the current application, the feature threshold corresponding to the fingerprint verification security level of the current application is obtained.
  • the feature threshold corresponding to the fingerprint verification security level of the current application may be obtained according to the obtained fingerprint verification security level and the saved second correspondence.
  • the first correspondence between different application identifiers and fingerprint verification security levels and the second correspondence between different fingerprint verification security levels and feature thresholds are saved, and then, after obtaining the current application identifier, the current application identifier may be determined according to the current application identifier.
  • the first correspondence relationship and the second correspondence relationship obtain the feature threshold corresponding to the fingerprint verification security level of the current application, and provide conditions for implementing fingerprint identification.
  • FIG. 3 is another flow chart showing obtaining a feature threshold according to an exemplary embodiment, as shown in FIG. Before step S201, the method may further include:
  • step S301 a prompt message is displayed to prompt the user to set a fingerprint verification security level for the application.
  • the mobile terminal may display prompt information at intervals, for example, every other week, to prompt the user to set a fingerprint verification security level for the application, or display the prompt information under other trigger conditions.
  • the message “Whether to set the fingerprint verification security level for the application” can be displayed on the mobile phone.
  • step S302 a trigger operation of the user is received, and a fingerprint verification security level setting page is displayed according to the trigger operation.
  • the mobile phone can display the fingerprint verification security level setting page, as shown in FIG. 4b, the fingerprint verification security level setting page can include application information and a security level for the user to select, for example, the user can To select a security level for application 1, assuming the selected security level is the first level, you can tick the box after the first level.
  • the user can directly set the fingerprint verification security level for different applications on the fingerprint verification security level setting page, without the user entering the fingerprint verification security level setting page by other means. ,easy to use.
  • FIG. 5 is a flowchart showing obtaining a feature threshold according to an exemplary embodiment. As shown in FIG. 5, the process may include the following steps S501-S505:
  • step S501 a fingerprint verification security level set by the user for different system environments and a feature threshold set for different fingerprint verification security levels are received.
  • the user can set the fingerprint verification security level for different system environments, and can also set the feature threshold for different fingerprint verification security levels.
  • the system environment M can be set to the first level, the system environment N to the second level, and the like.
  • the feature threshold of the first level may be set to 0.6
  • the feature threshold of the second level may be set to 0.8.
  • step S502 a first correspondence relationship between different system environment information and a fingerprint verification security level is saved, and a second correspondence relationship between different fingerprint verification security levels and feature thresholds is saved.
  • the first correspondence relationship between different system environment information and the fingerprint verification security level and the different fingerprint verification security levels and The second correspondence of the feature thresholds after setting the fingerprint verification security level of different system environments and the feature thresholds of different fingerprint verification security levels, the first correspondence relationship between different system environment information and the fingerprint verification security level and the different fingerprint verification security levels and The second correspondence of the feature thresholds.
  • step S503 current system environment information is obtained.
  • the fingerprint recognition IC circuit of the mobile terminal can obtain current system environment information.
  • step S504 according to the current system environment information and the first correspondence, the fingerprint verification security level of the current system environment is obtained.
  • the fingerprint verification security level of the current system environment may be obtained according to the obtained current system environment information and the saved first correspondence.
  • step S505 the feature level corresponding to the fingerprint verification security level of the current system environment is obtained according to the fingerprint verification security level and the second correspondence relationship of the current system environment.
  • the feature threshold corresponding to the fingerprint verification security level of the current system environment may be obtained according to the obtained fingerprint verification security level and the saved second correspondence.
  • the first correspondence between the different system environment information and the fingerprint verification security level and the second correspondence between the different fingerprint verification security levels and the feature thresholds are saved, and then, after obtaining the current system environment information, the current system environment information may be obtained.
  • the first correspondence relationship and the second correspondence relationship obtain the feature threshold corresponding to the fingerprint verification security level of the current system environment, and provide conditions for implementing fingerprint identification.
  • FIG. 6 is a flowchart showing another method for obtaining a feature threshold according to an exemplary embodiment. As shown in FIG. 6, before step S501, the method may further include:
  • step S601 a prompt message is displayed to prompt the user to set a fingerprint verification security level for the system environment.
  • the mobile terminal may display prompt information at intervals, for example, every other week, to prompt the user to set a fingerprint verification security level for the system environment, and may also display prompt information under other trigger conditions.
  • the message “Whether to set the fingerprint authentication security level for the system environment” can be displayed on the mobile phone.
  • step S602 a trigger operation of the user is received, and a fingerprint verification security level setting page is displayed according to the trigger operation.
  • the mobile phone can display the fingerprint verification security level setting page.
  • the fingerprint verification security level setting page can include system environment information and a security level selected by the user. For example, the user can To select a security level for system environment 1, assuming that the selected security level is the second level, you can tick the box after the second level.
  • the user can directly set the fingerprint verification security level for different system environments on the fingerprint verification security level setting page, without requiring the user to enter the fingerprint verification security level setting page by other means. ,easy to use.
  • FIG. 8a when the user uses the mobile phone 81, since the mobile phone 81 is in the lock screen state, the user is required to touch the fingerprint recognition virtual button 82 on the mobile phone 81 with a finger.
  • the fingerprint recognition circuit of the mobile phone 81 can acquire the fingerprint image of the user and extract the feature information of the fingerprint image, and at the same time, obtain the lock screen state of the mobile phone system, and obtain the fingerprint verification security of the lock screen.
  • the feature threshold corresponding to the level is then fingerprinted according to the extracted feature information and the acquired feature threshold.
  • the mobile phone 81 can be successfully unlocked, and the interface after the mobile phone 81 is successfully unlocked is as shown in FIG. 8b, and then the user The application on the mobile phone 81 can be clicked for shopping. When paying for the purchased item, the payment security can be improved by means of fingerprint payment.
  • the user can use the prompt information on the interface shown in FIG. 8c at the fingerprint identification virtual button 82. Press your finger to implement fingerprint payment. It can be seen that, in this embodiment, fingerprint identification can be performed on different application environments, and the recognition success rate is high, thereby avoiding multiple failures of fingerprint verification, and For convenience.
  • the present disclosure also provides an embodiment of a fingerprint identification device.
  • FIG. 9 is a block diagram of a fingerprint identification apparatus according to an exemplary embodiment. As shown in FIG. 9 , the fingerprint identification apparatus includes an acquisition extraction module 91, an obtaining module 92, and a comparison identification module 93.
  • the acquisition extraction module 91 is configured to acquire a fingerprint image and extract feature information of the fingerprint image.
  • the obtaining module 92 is configured to obtain current application environment information, and obtain a feature threshold corresponding to the fingerprint verification security level according to the current application environment information;
  • the comparison identification module 93 is configured to compare the feature information extracted by the acquisition extraction module 91 with the pre-stored verification feature information. If the comparison result reaches the corresponding feature threshold obtained by the obtaining module 92, the fingerprint recognition succeeds. If the result does not reach the corresponding feature threshold, fingerprint recognition fails.
  • the fingerprint identification device embodiment obtains the current application environment information, and obtains a feature threshold corresponding to the fingerprint verification security level according to the current application environment information, and then performs fingerprint identification according to the extracted feature information and the corresponding feature threshold, so that the fingerprint identification process can be performed.
  • the fingerprint threshold is verified according to the feature threshold corresponding to the security level of the fingerprint, thereby improving the fingerprint recognition rate.
  • FIG. 10 is a block diagram of another fingerprint identification apparatus according to an exemplary embodiment.
  • the obtaining module 92 may include: a first obtaining submodule 921. .
  • the first obtaining submodule 921 is configured to obtain the current application identifier, and obtain a feature threshold corresponding to the fingerprint verification security level of the current application according to the current application identifier.
  • the device may further include: a first receiving module 94 and a first saving module 95.
  • the first receiving module 94 is configured to receive the fingerprint verification security level and the pair set by the user for different application programs before the first obtaining sub-module 921 obtains the feature threshold corresponding to the fingerprint verification security level of the current application according to the current application identifier. Feature thresholds for different fingerprint verification security level settings.
  • the first saving module 95 is configured to save the first correspondence between the different application identifiers and the fingerprint verification security levels received by the first receiving module 94, and save the second correspondence between the different fingerprint verification security levels and the feature thresholds.
  • the first obtaining sub-module 921 may include: a first security level obtaining unit 9211 and a first feature threshold obtaining unit 9212.
  • the first security level obtaining unit 9211 is configured to obtain a fingerprint verification security level of the current application according to the current application identifier and the first correspondence relationship;
  • the first feature threshold obtaining unit 9212 is configured to obtain a feature threshold corresponding to the fingerprint verification security level of the current application according to the fingerprint verification security level and the second correspondence relationship of the current application obtained by the first security level obtaining unit 9211.
  • the first correspondence between the security levels of different application identifiers and fingerprints is saved, and
  • the second correspondence relationship between the fingerprint authentication security level and the feature threshold is obtained, and after obtaining the current application identifier, the fingerprint verification security level of the current application is obtained according to the current application identifier, the first correspondence, and the second correspondence.
  • the feature threshold provides a condition for fingerprint recognition.
  • FIG. 11 is a block diagram of another fingerprint identification device according to an exemplary embodiment. As shown in FIG. 11 , on the basis of the embodiment shown in FIG. 10 , the device may further include: a first prompt information display module. 96 and the first receiving display module 97.
  • the first prompt information display module 96 is configured to display prompt information to prompt the user before the first receiving module 94 receives the fingerprint verification security level set by the user for different applications and the feature threshold set for different fingerprint verification security levels.
  • the application sets the fingerprint verification security level.
  • the first receiving display module 97 is configured to receive a triggering operation of the user and display a fingerprint verification security level setting page according to the triggering operation.
  • the user can directly set the fingerprint verification security level for different applications on the fingerprint verification security level setting page, without the user entering the fingerprint verification security level setting page by other means. ,easy to use.
  • FIG. 12 is a block diagram of another fingerprint identification apparatus according to an exemplary embodiment.
  • the obtaining module 92 may include: a second obtaining sub-module 922. .
  • the second obtaining sub-module 922 is configured to obtain current system environment information, and obtain a feature threshold corresponding to the fingerprint verification security level of the current system environment according to the current system environment information.
  • the device may further include: a second receiving module 98 and a second saving module 99.
  • the second receiving module 98 is configured to receive, before the second obtaining sub-module obtains the feature threshold corresponding to the fingerprint verification security level of the current system environment, according to the current system environment information, and receive the fingerprint verification security level and the pair differently set by the user for different system environments.
  • the second saving module 99 is configured to save the first correspondence between the different system environment information and the fingerprint verification security level received by the second receiving module 98, and save the second corresponding relationship between the different fingerprint verification security levels and the feature threshold.
  • the second obtaining submodule 922 may include: a second security level obtaining unit 9221 and a second feature threshold obtaining unit 9222.
  • the second security level obtaining unit 9221 is configured to obtain a fingerprint verification security level of the current system environment according to the current system environment information and the first correspondence relationship.
  • the second feature threshold obtaining unit 9222 is configured to obtain a feature threshold corresponding to the fingerprint verification security level of the current system environment according to the fingerprint verification security level and the second correspondence relationship of the current system environment obtained by the second security level obtaining unit 9221.
  • the first correspondence between the different system environment information and the fingerprint verification security level and the second correspondence between the different fingerprint verification security levels and the feature thresholds are saved, and then, after obtaining the current system environment information, the current system environment information may be obtained.
  • the first correspondence relationship and the second correspondence relationship obtain the feature threshold corresponding to the fingerprint verification security level of the current system environment, and provide conditions for implementing fingerprint identification.
  • FIG. 13 is a block diagram of another fingerprint identification device according to an exemplary embodiment. As shown in FIG. 13 , on the basis of the embodiment shown in FIG. 12 , the device may further include: a second prompt information display module. 131 and second receiving display module 132.
  • the second prompt information display module 131 is configured to display prompt information to prompt the user to set fingerprint verification for the system environment before receiving the fingerprint verification security level set by the user for different system environments and the feature threshold set for different fingerprint verification security levels.
  • the second receiving display module 132 is configured to receive a triggering operation of the user, and display a fingerprint verification security level setting page according to the triggering operation.
  • the user can directly set the fingerprint verification security level for different system environments on the fingerprint verification security level setting page, without requiring the user to enter the fingerprint verification security level setting page by other means. ,easy to use.
  • FIG. 14 is a block diagram of a fingerprint recognition apparatus, according to an exemplary embodiment.
  • device 1400 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, an aircraft, and the like.
  • apparatus 1400 can include one or more of the following components: processing component 1402, memory 1404, power component 1406, multimedia component 1408, audio component 1410, input/output (I/O) interface 1412, sensor component 1414, And a communication component 1416.
  • Processing component 1402 typically controls the overall operation of device 1400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 1402 can include one or more processors 1420 to execute instructions to perform all or part of the steps of the above described methods.
  • processing component 1402 can include one or more modules to facilitate interaction between component 1402 and other components.
  • processing component 1402 can include a multimedia module to facilitate interaction between multimedia component 1408 and processing component 1402.
  • Memory 1404 is configured to store various types of data to support operation at device 1400. Examples of such data include instructions for any application or method operating on device 1400, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 1404 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM programmable read only memory
  • ROM read only memory
  • Magnetic memory flash memory, disk or optical disk.
  • Power component 1406 provides power to various components of device 1400.
  • Power component 1406 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1400.
  • the multimedia component 1408 includes a screen between the device 1400 and the user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor can sense not only the boundaries of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 1408 includes a front camera and/or a rear camera. When the device 1400 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1410 is configured to output and/or input an audio signal.
  • the audio component 1410 includes a microphone (MIC) that is configured to receive an external audio signal when the device 1400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 1404 or transmitted via communication component 1416.
  • the audio component 1410 also includes a speaker for outputting an audio signal.
  • the I/O interface 1412 provides an interface between the processing component 1402 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 1414 includes one or more sensors for providing a status assessment of various aspects to device 1400.
  • sensor component 1414 can detect an open/closed state of device 1400, a relative positioning of components, such as the display and keypad of device 1400, and sensor component 1414 can also detect a change in position of one component of device 1400 or device 1400. The presence or absence of contact by the user with the device 1400, the orientation or acceleration/deceleration of the device 1400 and the temperature change of the device 1400.
  • Sensor assembly 1414 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 1414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1414 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 1416 is configured to facilitate wired or wireless communication between device 1400 and other devices.
  • the device 1400 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • communication component 1416 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 1416 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • device 1400 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), A gated array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA gated array
  • controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 1404 comprising instructions executable by processor 1420 of apparatus 1400 to perform the above method.
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)
  • Health & Medical Sciences (AREA)
  • Biophysics (AREA)
  • Pathology (AREA)
  • Biomedical Technology (AREA)
  • Heart & Thoracic Surgery (AREA)
  • Medical Informatics (AREA)
  • Molecular Biology (AREA)
  • Surgery (AREA)
  • Animal Behavior & Ethology (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Veterinary Medicine (AREA)

Abstract

一种指纹识别方法及装置,其中,指纹识别方法包括:获取指纹图像,并提取指纹图像的特征信息(S101);获得当前应用环境信息,并根据当前应用环境信息获得指纹验证安全等级对应的特征阈值(S102);将提取的特征信息与预存的验证特征信息进行比对,若比对结果达到对应的特征阈值,则指纹识别成功,若比对结果未达到对应的特征阈值,则指纹识别失败(S103)。通过获得当前应用环境信息,并根据当前应用环境信息获得指纹验证安全等级对应的特征阈值,然后根据提取的特征信息和对应的特征阈值进行指纹识别,使得指纹识别过程可以根据指纹验证安全等级对应的特征阈值来完成,从而提高了指纹识别率。

Description

指纹识别方法及装置
本申请基于申请号为201510520041.8、申请日为2015年8月21日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本公开涉及通信技术领域,尤其涉及一种指纹识别方法及装置。
背景技术
随着移动终端技术的快速发展,各种移动终端例如手机已非常普及,并且,功能不断增多,这些新功能给用户带来很多便利,深受用户的喜爱。例如,目前手机具有指纹识别虚拟按键,用户通过触摸该虚拟按键可进行指纹识别,从而完成解锁操作。
目前的指纹识别虚拟按键是将指纹识别传感器设置在玻璃盖板下方来实现的,当用户手指触碰到玻璃盖板时,指纹识别传感器识别到手指信号,然后进行指纹识别。
但是,由于指纹识别传感器位于玻璃盖板的下方,会导致指纹识别传感器的灵敏度较差,指纹识别率低。
发明内容
为克服相关技术中存在的问题,本公开提供一种指纹识别方法及装置。
根据本公开实施例的第一方面,提供一种指纹识别方法,包括:
获取指纹图像,并提取所述指纹图像的特征信息;
获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值;
将提取的所述特征信息与预存的验证特征信息进行比对,若比对结果达到所述对应的特征阈值,则指纹识别成功,若比对结果未达到所述对应的特征阈值,则指纹识别失败。
在一实施例中,所述获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值,包括:
获得当前应用程序标识,并根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值。
在一实施例中,所述方法还包括:
在所述根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值之前,接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值;
保存不同应用程序标识和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
在一实施例中,所述根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值,包括:
根据所述当前应用程序标识和所述第一对应关系,获得所述当前应用程序的指纹验证安全等级;
根据所述当前应用程序的指纹验证安全等级和所述第二对应关系,获得所述当前应用程序的指纹验证安全等级对应的特征阈值。
在一实施例中,所述方法还包括:
在所述接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为应用程序设置所述指纹验证安全等级;
接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
在一实施例中,所述获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值,包括:
获得当前系统环境信息,并根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值。
在一实施例中,所述方法还包括:
在所述根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值之前,接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值;
保存不同系统环境信息和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
在一实施例中,所述根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值,包括:
根据所述当前系统环境信息和所述第一对应关系,获得所述当前系统环境的指纹验证安全等级;
根据所述当前系统环境的指纹验证安全等级和所述第二对应关系,获得所述当前系统环境的指纹验证安全等级对应的特征阈值。
在一实施例中,所述方法还包括:
在所述接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为系统环境设置所述指纹验证安全等级;
接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
根据本公开实施例的第二方面,提供一种指纹识别装置,包括:
获取提取模块,被配置为获取指纹图像,并提取所述指纹图像的特征信息;
获得模块,被配置为获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值;
比对识别模块,被配置为将所述获取提取模块提取的所述特征信息与预存的验证特征信息进行比对,若比对结果达到所述获得模块获得的所述对应的特征阈值,则指纹识别成功,若比对结果未达到所述对应的特征阈值,则指纹识别失败。
在一实施例中,所述获得模块包括:
第一获得子模块,被配置为获得当前应用程序标识,并根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值。
在一实施例中,所述装置还包括:
第一接收模块,被配置为在所述第一获得子模块根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值之前,接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值;
第一保存模块,被配置为保存所述第一接收模块接收的不同应用程序标识和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
在一实施例中,所述第一获得子模块包括:
第一安全等级获得单元,被配置为根据所述当前应用程序标识和所述第一对应关系,获得所述当前应用程序的指纹验证安全等级;
第一特征阈值获得单元,被配置为根据所述第一安全等级获得单元获得的所述当前应用程序的指纹验证安全等级和所述第二对应关系,获得所述当前应用程序的指纹验证安全等级对应的特征阈值。
在一实施例中,所述装置还包括:
第一提示信息显示模块,被配置为在所述第一接收模块接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为应用程序设置所述指纹验证安全等级;
第一接收显示模块,被配置为接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
在一实施例中,所述获得模块包括:
第二获得子模块,被配置为获得当前系统环境信息,并根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值。
在一实施例中,所述装置还包括:
第二接收模块,被配置为在所述第二获得子模块根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值之前,接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值;
第二保存模块,被配置为保存所述第二接收模块接收的不同系统环境信息和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
在一实施例中,所述第二获得子模块包括:
第二安全等级获得单元,被配置为根据所述当前系统环境信息和所述第一对应关系,获得所述当前系统环境的指纹验证安全等级;
第二特征阈值获得单元,被配置为根据所述第二安全等级获得单元获得的所述当前系统环境的指纹验证安全等级和所述第二对应关系,获得所述当前系统环境的指纹验证安全等级对应的特征阈值。
在一实施例中,所述装置还包括:
第二提示信息显示模块,被配置为在所述接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为系统环境设置所述指纹验证安全等级;
第二接收显示模块,被配置为接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
根据本公开实施例的第三方面,提供一种指纹识别装置,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:
获取指纹图像,并提取所述指纹图像的特征信息;
获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值;
将提取的所述特征信息与预存的验证特征信息进行比对,若比对结果达到所述对应的特征阈值,则指纹识别成功,若比对结果未达到所述对应的特征阈值,则指纹识别失败。
本公开的实施例提供的技术方案可以包括以下有益效果:通过获得当前应用环境信息,并根据当前应用环境信息获得指纹验证安全等级对应的特征阈值,然后根据提取的特征信息和对应的特征阈值进行指纹识别,使得指纹识别过程可以根据指纹验证安全等级对应的特征阈值来完成,从而提高了指纹识别率。
提供一种获得特征阈值的方式,为实现指纹识别提供了条件。
通过保存不同应用程序标识和指纹验证安全等级的第一对应关系以及不同指纹验证安全等级和特征阈值的第二对应关系,为获得特征阈值提供了条件。
根据当前应用程序标识、保存的第一对应关系和第二对应关系,可以获得当前应用程序的指纹验证安全等级对应的特征阈值。
通过显示指纹验证安全等级设置页面,使得用户可以直接在该指纹验证安全等级设置页面上为不同应用程序设置指纹验证安全等级,而不需要用户通过其他方式进入指纹验证 安全等级设置页面,操作简单。
提供另一种获得特征阈值的方式,为实现指纹识别提供了条件。
通过保存不同系统环境信息和指纹验证安全等级的第一对应关系以及不同指纹验证安全等级和特征阈值的第二对应关系,为获得特征阈值提供了条件。
根据当前系统环境信息、保存的第一对应关系和第二对应关系,可以获得当前系统环境的指纹验证安全等级对应的特征阈值。
通过显示指纹验证安全等级设置页面,使得用户可以直接在该指纹验证安全等级设置页面上为不同系统环境设置指纹验证安全等级,而不需要用户通过其他方式进入指纹验证安全等级设置页面,操作简单。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的一种指纹识别方法的流程图。
图2是根据一示例性实施例示出的一种获得特征阈值的流程图。
图3是根据一示例性实施例示出的另一种获得特征阈值的流程图。
图4a是根据一示例性实施例示出的移动终端的界面示意图一。
图4b是根据一示例性实施例示出的移动终端的界面示意图二。
图5是根据一示例性实施例示出的又一种获得特征阈值的流程图。
图6是根据一示例性实施例示出的再一种获得特征阈值的流程图。
图7a是根据一示例性实施例示出的移动终端的界面示意图三。
图7b是根据一示例性实施例示出的移动终端的界面示意图四。
图8a-8c是根据一示例性实施例示出的指纹识别方法的场景图。
图9是根据一示例性实施例示出的一种指纹识别装置的框图。
图10是根据一示例性实施例示出的另一种指纹识别装置的框图。
图11是根据一示例性实施例示出的另一种指纹识别装置的框图。
图12是根据一示例性实施例示出的另一种指纹识别装置的框图。
图13是根据一示例性实施例示出的另一种指纹识别装置的框图。
图14是根据一示例性实施例示出的一种适用于指纹识别装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中 所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的指纹识别方法的流程图,如图1所示,该指纹识别方法可应用于移动终端上,该移动终端可以包括手机、平板电脑等终端,该指纹识别方法可以包括以下步骤S101-S103:
在步骤S101中,获取指纹图像,并提取指纹图像的特征信息。
在该实施例中,当用户手指触碰到移动终端例如手机的指纹识别虚拟按键时,移动终端的指纹识别电路可以获取用户的指纹图像,并对指纹图像进行预处理,然后从预处理后的指纹图像中提取指纹图像的特征信息。
在步骤S102中,获得当前应用环境信息,并根据当前应用环境信息获得指纹验证安全等级对应的特征阈值。
其中,当前应用环境信息可以为应用程序标识,也可以为当前系统环境信息,例如,当前手机系统是否处于锁屏状态等。
在该实施例中,指纹识别电路可以获得当前应用环境信息,例如,获得当前应用程序标识,并根据当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值;又例如,可以获得当前系统环境信息,并根据当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值。
其中,不同的应用环境信息可以具有不同的指纹验证安全等级,不同的指纹验证安全等级可以具有不同的特征阈值。
例如,屏幕唤醒解锁的指纹验证安全等级可以为第一等级,指纹支付的指纹验证安全等级可以为第四等级,其中,第一等级小于第四等级。而第一等级的特征阈值可以为0.6,第四等级的特征阈值可以为1。
需要说明的是,上述指纹验证安全等级及其特征阈值均为示例性说明,本公开实施例对此并不进行限制。
另外,上述步骤S101和S102并无严格的先后执行顺序。
在步骤S103中,将提取的特征信息与预存的验证特征信息进行比对,若比对结果达到对应的特征阈值,则指纹识别成功,若比对结果未达到对应的特征阈值,则指纹识别失败。
在该实施例中,在指纹识别之前,会将用于验证指纹信息是否正确的验证特征信息保存在移动终端中。这样,在提取指纹图像的特征信息和获得指纹验证安全等级对应的特征阈值之后,可以将提取的特征信息与预存的验证特征信息进行比对,若比对结果达到对应的特征阈值,则指纹识别成功,若比对结果未达到对应的特征阈值,则指纹识别失败。
假设,预存的验证特征信息包含5个特征,当前应用程序的指纹验证安全等级为第一等级,对应的特征阈值为0.6,若将提取的特征信息与验证特征信息进行比对,发现其中三个特征匹配成功,即比对结果达到对应的特征阈值,则确定指纹识别成功;若将提取的 特征信息与验证特征信息进行比对,发现其中两个特征匹配成功,即比对结果未达到对应的特征阈值,则确定指纹识别失败。
上述指纹识别方法实施例,通过获得当前应用环境信息,并根据当前应用环境信息获得指纹验证安全等级对应的特征阈值,然后根据提取的特征信息和对应的特征阈值进行指纹识别,使得指纹识别过程可以根据指纹验证安全等级对应的特征阈值来完成,从而提高了指纹识别率。
图2是根据一示例性实施例示出的一种获得特征阈值的流程图,如图2所示,该过程可以包括如下步骤S201-S205:
在步骤S201中,接收用户对不同应用程序设置的指纹验证安全等级和对不同指纹验证安全等级设置的特征阈值。
为了提高指纹识别率,用户可以对不同的应用程序设置指纹验证安全等级,也可以对不同的指纹验证安全等级设置特征阈值。
例如,可以将应用程序A-D设置为第一等级,应用程序E、G设置为第二等级,应用程序F设置为第三等级等。第一等级的特征阈值可以设置为0.6,第二等级的特征阈值可以设置为0.8,第三等级的特征阈值可以设置为0.9。
在步骤S202中,保存不同应用程序标识和指纹验证安全等级的第一对应关系,并保存不同指纹验证安全等级和特征阈值的第二对应关系。
在该实施例中,在设置不同应用程序的指纹验证安全等级和不同指纹验证安全等级的特征阈值之后,可以保存不同应用程序标识和指纹验证安全等级的第一对应关系以及不同指纹验证安全等级和特征阈值的第二对应关系。
在步骤S203中,获得当前应用程序标识。
在该实施例中,移动终端的指纹识别IC电路可以获得当前应用程序标识。
在步骤S204中,根据当前应用程序标识和第一对应关系,获得当前应用程序的指纹验证安全等级。
在该实施例中,可以根据获得的当前应用程序标识和保存的第一对应关系获得当前应用程序的指纹验证安全等级。
在步骤S205中,根据当前应用程序的指纹验证安全等级和第二对应关系,获得当前应用程序的指纹验证安全等级对应的特征阈值。
在该实施例中,可以根据获得的指纹验证安全等级和保存的第二对应关系,获得当前应用程序的指纹验证安全等级对应的特征阈值。
上述实施例,通过保存不同应用程序标识和指纹验证安全等级的第一对应关系以及不同指纹验证安全等级和特征阈值的第二对应关系,然后在获得当前应用程序标识后,可以根据当前应用程序标识、第一对应关系和第二对应关系,获得当前应用程序的指纹验证安全等级对应的特征阈值,为实现指纹识别提供了条件。
图3是根据一示例性实施例示出的另一种获得特征阈值的流程图,如图3所示,在步 骤S201之前,还可以包括:
在步骤S301中,显示提示信息,以提示用户为应用程序设置指纹验证安全等级。
在该实施例中,移动终端可以每隔一段时间,例如每隔一周,显示提示信息,以提示用户为应用程序设置指纹验证安全等级,也可以在其他触发条件下显示提示信息。
如图4a所示,手机上可以显示“是否为应用程序设置指纹验证安全等级”的提示信息。
在步骤S302中,接收用户的触发操作,并根据触发操作显示指纹验证安全等级设置页面。
继续上例进行描述,如果用户想设置指纹验证安全等级,可以点击“确定”按键,如果用户不想设置指纹验证安全等级,可以点击“取消”按键。假设,用户点击“确定”按键,则手机可以显示指纹验证安全等级设置页面,如图4b所示,该指纹验证安全等级设置页面可以包含应用程序信息及供用户选择的安全等级,例如,用户可以为应用程序1选择安全等级,假设选择的安全等级为第一等级,则可以在第一等级后面的方框内打勾。
上述实施例,通过显示指纹验证安全等级设置页面,使得用户可以直接在该指纹验证安全等级设置页面上为不同应用程序设置指纹验证安全等级,而不需要用户通过其他方式进入指纹验证安全等级设置页面,操作简单。
图5是根据一示例性实施例示出的一种获得特征阈值的流程图,如图5所示,该过程可以包括如下步骤S501-S505:
在步骤S501中,接收用户对不同系统环境设置的指纹验证安全等级和对不同指纹验证安全等级设置的特征阈值。
为了提高指纹识别率,用户可以对不同的系统环境设置指纹验证安全等级,也可以对不同的指纹验证安全等级设置特征阈值。
例如,可以将系统环境M设置为第一等级,系统环境N设置为第二等级等。第一等级的特征阈值可以设置为0.6,第二等级的特征阈值可以设置为0.8。
在步骤S502中,保存不同系统环境信息和指纹验证安全等级的第一对应关系,并保存不同指纹验证安全等级和特征阈值的第二对应关系。
在该实施例中,在设置不同系统环境的指纹验证安全等级和不同指纹验证安全等级的特征阈值之后,可以保存不同系统环境信息和指纹验证安全等级的第一对应关系以及不同指纹验证安全等级和特征阈值的第二对应关系。
在步骤S503中,获得当前系统环境信息。
在该实施例中,移动终端的指纹识别IC电路可以获得当前系统环境信息。
在步骤S504中,根据当前系统环境信息和第一对应关系,获得当前系统环境的指纹验证安全等级。
在该实施例中,可以根据获得的当前系统环境信息和保存的第一对应关系获得当前系统环境的指纹验证安全等级。
在步骤S505中,根据当前系统环境的指纹验证安全等级和第二对应关系,获得当前系统环境的指纹验证安全等级对应的特征阈值。
在该实施例中,可以根据获得的指纹验证安全等级和保存的第二对应关系,获得当前系统环境的指纹验证安全等级对应的特征阈值。
上述实施例,通过保存不同系统环境信息和指纹验证安全等级的第一对应关系以及不同指纹验证安全等级和特征阈值的第二对应关系,然后在获得当前系统环境信息后,可以根据当前系统环境信息、第一对应关系和第二对应关系,获得当前系统环境的指纹验证安全等级对应的特征阈值,为实现指纹识别提供了条件。
图6是根据一示例性实施例示出的另一种获得特征阈值的流程图,如图6所示,在步骤S501之前,还可以包括:
在步骤S601中,显示提示信息,以提示用户为系统环境设置指纹验证安全等级。
在该实施例中,移动终端可以每隔一段时间,例如每隔一周,显示提示信息,以提示用户为系统环境设置指纹验证安全等级,也可以在其他触发条件下显示提示信息。
如图7a所示,手机上可以显示“是否为系统环境设置指纹验证安全等级”的提示信息。
在步骤S602中,接收用户的触发操作,并根据触发操作显示指纹验证安全等级设置页面。
继续上例进行描述,如果用户想设置指纹验证安全等级,可以点击“确定”按键,如果用户不想设置指纹验证安全等级,可以点击“取消”按键。假设,用户点击“确定”按键,则手机可以显示指纹验证安全等级设置页面,如图7b所示,该指纹验证安全等级设置页面可以包含系统环境信息及供用户选择的安全等级,例如,用户可以为系统环境1选择安全等级,假设选择的安全等级为第二等级,则可以在第二等级后面的方框内打勾。
上述实施例,通过显示指纹验证安全等级设置页面,使得用户可以直接在该指纹验证安全等级设置页面上为不同系统环境设置指纹验证安全等级,而不需要用户通过其他方式进入指纹验证安全等级设置页面,操作简单。
下面结合图8a-8c对本公开进行示例性说明,如图8a所示,当用户使用手机81时,由于手机81处于锁屏状态,因此,需要用户用手指触摸手机81上的指纹识别虚拟按键82,当用户触摸指纹识别虚拟按键82时,手机81的指纹识别电路可以获取用户的指纹图像,并提取指纹图像的特征信息,同时,获得手机系统处于锁屏状态,并获取锁屏的指纹验证安全等级对应的特征阈值,然后根据提取的特征信息和获取的特征阈值进行指纹识别,若指纹识别成功,则手机81可被成功解锁,手机81被成功解锁后的界面如图8b所示,然后用户可以点击手机81上的应用程序进行购物,在为所购物品买单时,可以通过指纹支付的方式来提高支付安全性,用户可根据图8c所示界面上的提示信息在指纹识别虚拟按键82处按压手指,以实现指纹支付。由此可见,通过本实施例可以对不同的应用环境进行指纹识别,且识别成功率高,从而避免出现多次指纹验证失败的情况,为用户提 供方便。
与前述指纹识别方法实施例相对应,本公开还提供了指纹识别装置实施例。
图9是根据一示例性实施例示出的一种指纹识别装置的框图,如图9所示,该指纹识别装置包括:获取提取模块91、获得模块92和比对识别模块93。
获取提取模块91,被配置为获取指纹图像,并提取指纹图像的特征信息。
获得模块92,被配置为获得当前应用环境信息,并根据当前应用环境信息获得指纹验证安全等级对应的特征阈值;
比对识别模块93,被配置为将获取提取模块91提取的特征信息与预存的验证特征信息进行比对,若比对结果达到获得模块92获得的对应的特征阈值,则指纹识别成功,若比对结果未达到对应的特征阈值,则指纹识别失败。
图9所示装置识别指纹的过程可参见图1所示方法实施例的对应部分,此处不赘述。
上述指纹识别装置实施例,通过获得当前应用环境信息,并根据当前应用环境信息获得指纹验证安全等级对应的特征阈值,然后根据提取的特征信息和对应的特征阈值进行指纹识别,使得指纹识别过程可以根据指纹验证安全等级对应的特征阈值来完成,从而提高了指纹识别率。
图10是根据一示例性实施例示出的另一种指纹识别装置的框图,如图10所示,在上述图9所示实施例的基础上,获得模块92可包括:第一获得子模块921。
第一获得子模块921,被配置为获得当前应用程序标识,并根据当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值。
另外,该装置还可以包括:第一接收模块94和第一保存模块95。
第一接收模块94,被配置为在第一获得子模块921根据当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值之前,接收用户对不同应用程序设置的指纹验证安全等级和对不同指纹验证安全等级设置的特征阈值。
第一保存模块95,被配置为保存第一接收模块94接收的不同应用程序标识和指纹验证安全等级的第一对应关系,并保存不同指纹验证安全等级和特征阈值的第二对应关系。
其中,第一获得子模块921可包括:第一安全等级获得单元9211和第一特征阈值获得单元9212。
第一安全等级获得单元9211,被配置为根据当前应用程序标识和第一对应关系,获得当前应用程序的指纹验证安全等级;
第一特征阈值获得单元9212,被配置为根据第一安全等级获得单元9211获得的当前应用程序的指纹验证安全等级和第二对应关系,获得当前应用程序的指纹验证安全等级对应的特征阈值。
图10所示装置获得特征阈值过程可参见图2所示方法实施例的对应部分,此处不赘述。
上述实施例,通过保存不同应用程序标识和指纹验证安全等级的第一对应关系以及不 同指纹验证安全等级和特征阈值的第二对应关系,然后在获得当前应用程序标识后,可以根据当前应用程序标识、第一对应关系和第二对应关系,获得当前应用程序的指纹验证安全等级对应的特征阈值,为实现指纹识别提供了条件。
图11是根据一示例性实施例示出的另一种指纹识别装置的框图,如图11所示,在上述图10所示实施例的基础上,该装置还可包括:第一提示信息显示模块96和第一接收显示模块97。
第一提示信息显示模块96,被配置为在第一接收模块94接收用户对不同应用程序设置的指纹验证安全等级和对不同指纹验证安全等级设置的特征阈值之前,显示提示信息,以提示用户为应用程序设置指纹验证安全等级。
第一接收显示模块97,被配置为接收用户的触发操作,并根据触发操作显示指纹验证安全等级设置页面。
图11所示装置获得特征阈值过程可参见图3所示方法实施例的对应部分,此处不赘述。
上述实施例,通过显示指纹验证安全等级设置页面,使得用户可以直接在该指纹验证安全等级设置页面上为不同应用程序设置指纹验证安全等级,而不需要用户通过其他方式进入指纹验证安全等级设置页面,操作简单。
图12是根据一示例性实施例示出的另一种指纹识别装置的框图,如图12所示,在上述图9所示实施例的基础上,获得模块92可包括:第二获得子模块922。
第二获得子模块922,被配置为获得当前系统环境信息,并根据当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值。
另外,该装置还可以包括:第二接收模块98和第二保存模块99。
第二接收模块98,被配置为在第二获得子模块根据当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值之前,接收用户对不同系统环境设置的指纹验证安全等级和对不同指纹验证安全等级设置的特征阈值;
第二保存模块99,被配置为保存第二接收模块98接收的不同系统环境信息和指纹验证安全等级的第一对应关系,并保存不同指纹验证安全等级和特征阈值的第二对应关系。
其中,第二获得子模块922可包括:第二安全等级获得单元9221和第二特征阈值获得单元9222。
第二安全等级获得单元9221,被配置为根据当前系统环境信息和第一对应关系,获得当前系统环境的指纹验证安全等级。
第二特征阈值获得单元9222,被配置为根据第二安全等级获得单元9221获得的当前系统环境的指纹验证安全等级和第二对应关系,获得当前系统环境的指纹验证安全等级对应的特征阈值。
图12所示装置获得特征阈值过程可参见图5所示方法实施例的对应部分,此处不赘述。
上述实施例,通过保存不同系统环境信息和指纹验证安全等级的第一对应关系以及不同指纹验证安全等级和特征阈值的第二对应关系,然后在获得当前系统环境信息后,可以根据当前系统环境信息、第一对应关系和第二对应关系,获得当前系统环境的指纹验证安全等级对应的特征阈值,为实现指纹识别提供了条件。
图13是根据一示例性实施例示出的另一种指纹识别装置的框图,如图13所示,在上述图12所示实施例的基础上,该装置还可包括:第二提示信息显示模块131和第二接收显示模块132。
第二提示信息显示模块131,被配置为在接收用户对不同系统环境设置的指纹验证安全等级和对不同指纹验证安全等级设置的特征阈值之前,显示提示信息,以提示用户为系统环境设置指纹验证安全等级;
第二接收显示模块132,被配置为接收用户的触发操作,并根据触发操作显示指纹验证安全等级设置页面。
图13所示装置获得特征阈值过程可参见图6所示方法实施例的对应部分,此处不赘述。
上述实施例,通过显示指纹验证安全等级设置页面,使得用户可以直接在该指纹验证安全等级设置页面上为不同系统环境设置指纹验证安全等级,而不需要用户通过其他方式进入指纹验证安全等级设置页面,操作简单。
关于上述实施例中的装置,其中各个模块、子模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图14是根据一示例性实施例示出的一种适用于指纹识别装置的框图。例如,装置1400可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理,飞行器等。
参照图14,装置1400可以包括以下一个或多个组件:处理组件1402,存储器1404,电源组件1406,多媒体组件1408,音频组件1410,输入/输出(I/O)的接口1412,传感器组件1414,以及通信组件1416。
处理组件1402通常控制装置1400的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理元件1402可以包括一个或多个处理器1420来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1402可以包括一个或多个模块,便于处理组件1402和其他组件之间的交互。例如,处理部件1402可以包括多媒体模块,以方便多媒体组件1408和处理组件1402之间的交互。
存储器1404被配置为存储各种类型的数据以支持在设备1400的操作。这些数据的示例包括用于在装置1400上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1404可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM), 磁存储器,快闪存储器,磁盘或光盘。
电力组件1406为装置1400的各种组件提供电力。电力组件1406可以包括电源管理系统,一个或多个电源,及其他与为装置1400生成、管理和分配电力相关联的组件。
多媒体组件1408包括在装置1400和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1408包括一个前置摄像头和/或后置摄像头。当设备1400处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1410被配置为输出和/或输入音频信号。例如,音频组件1410包括一个麦克风(MIC),当装置1400处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1404或经由通信组件1416发送。在一些实施例中,音频组件1410还包括一个扬声器,用于输出音频信号。
I/O接口1412为处理组件1402和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1414包括一个或多个传感器,用于为装置1400提供各个方面的状态评估。例如,传感器组件1414可以检测到设备1400的打开/关闭状态,组件的相对定位,例如所述组件为装置1400的显示器和小键盘,传感器组件1414还可以检测装置1400或装置1400一个组件的位置改变,用户与装置1400接触的存在或不存在,装置1400方位或加速/减速和装置1400的温度变化。传感器组件1414可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1414还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1414还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1416被配置为便于装置1400和其他设备之间有线或无线方式的通信。装置1400可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信部件1416经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信部件1416还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置1400可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可 编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1404,上述指令可由装置1400的处理器1420执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (19)

  1. 一种指纹识别方法,其特征在于,所述方法包括:
    获取指纹图像,并提取所述指纹图像的特征信息;
    获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值;
    将提取的所述特征信息与预存的验证特征信息进行比对,若比对结果达到所述对应的特征阈值,则指纹识别成功,若比对结果未达到所述对应的特征阈值,则指纹识别失败。
  2. 根据权利要求1所述的指纹识别方法,其特征在于,所述获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值,包括:
    获得当前应用程序标识,并根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值。
  3. 根据权利要求2所述的指纹识别方法,其特征在于,所述方法还包括:
    在所述根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值之前,接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值;
    保存不同应用程序标识和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
  4. 根据权利要求3所述的指纹识别方法,其特征在于,所述根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值,包括:
    根据所述当前应用程序标识和所述第一对应关系,获得所述当前应用程序的指纹验证安全等级;
    根据所述当前应用程序的指纹验证安全等级和所述第二对应关系,获得所述当前应用程序的指纹验证安全等级对应的特征阈值。
  5. 根据权利要求3所述的指纹识别方法,其特征在于,所述方法还包括:
    在所述接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为应用程序设置所述指纹验证安全等级;
    接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
  6. 根据权利要求1所述的指纹识别方法,其特征在于,所述获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值,包括:
    获得当前系统环境信息,并根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值。
  7. 根据权利要求6所述的指纹识别方法,其特征在于,所述方法还包括:
    在所述根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值之前,接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安 全等级设置的所述特征阈值;
    保存不同系统环境信息和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
  8. 根据权利要求7所述的指纹识别方法,其特征在于,所述根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值,包括:
    根据所述当前系统环境信息和所述第一对应关系,获得所述当前系统环境的指纹验证安全等级;
    根据所述当前系统环境的指纹验证安全等级和所述第二对应关系,获得所述当前系统环境的指纹验证安全等级对应的特征阈值。
  9. 根据权利要求7所述的指纹识别方法,其特征在于,所述方法还包括:
    在所述接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为系统环境设置所述指纹验证安全等级;
    接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
  10. 一种指纹识别装置,其特征在于,所述装置包括:
    获取提取模块,被配置为获取指纹图像,并提取所述指纹图像的特征信息;
    获得模块,被配置为获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值;
    比对识别模块,被配置为将所述获取提取模块提取的所述特征信息与预存的验证特征信息进行比对,若比对结果达到所述获得模块获得的所述对应的特征阈值,则指纹识别成功,若比对结果未达到所述对应的特征阈值,则指纹识别失败。
  11. 根据权利要求10所述的指纹识别装置,其特征在于,所述获得模块包括:
    第一获得子模块,被配置为获得当前应用程序标识,并根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值。
  12. 根据权利要求11所述的指纹识别装置,其特征在于,所述装置还包括:
    第一接收模块,被配置为在所述第一获得子模块根据所述当前应用程序标识获得当前应用程序的指纹验证安全等级对应的特征阈值之前,接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值;
    第一保存模块,被配置为保存所述第一接收模块接收的不同应用程序标识和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
  13. 根据权利要求12所述的指纹识别装置,其特征在于,所述第一获得子模块包括:
    第一安全等级获得单元,被配置为根据所述当前应用程序标识和所述第一对应关系,获得所述当前应用程序的指纹验证安全等级;
    第一特征阈值获得单元,被配置为根据所述第一安全等级获得单元获得的所述当前应 用程序的指纹验证安全等级和所述第二对应关系,获得所述当前应用程序的指纹验证安全等级对应的特征阈值。
  14. 根据权利要求12所述的指纹识别装置,其特征在于,所述装置还包括:
    第一提示信息显示模块,被配置为在所述第一接收模块接收用户对不同应用程序设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为应用程序设置所述指纹验证安全等级;
    第一接收显示模块,被配置为接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
  15. 根据权利要求10所述的指纹识别装置,其特征在于,所述获得模块包括:
    第二获得子模块,被配置为获得当前系统环境信息,并根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值。
  16. 根据权利要求15所述的指纹识别装置,其特征在于,所述装置还包括:
    第二接收模块,被配置为在所述第二获得子模块根据所述当前系统环境信息获得当前系统环境的指纹验证安全等级对应的特征阈值之前,接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值;
    第二保存模块,被配置为保存所述第二接收模块接收的不同系统环境信息和所述指纹验证安全等级的第一对应关系,并保存所述不同指纹验证安全等级和所述特征阈值的第二对应关系。
  17. 根据权利要求16所述的指纹识别装置,其特征在于,所述第二获得子模块包括:
    第二安全等级获得单元,被配置为根据所述当前系统环境信息和所述第一对应关系,获得所述当前系统环境的指纹验证安全等级;
    第二特征阈值获得单元,被配置为根据所述第二安全等级获得单元获得的所述当前系统环境的指纹验证安全等级和所述第二对应关系,获得所述当前系统环境的指纹验证安全等级对应的特征阈值。
  18. 根据权利要求16所述的指纹识别装置,其特征在于,所述装置还包括:
    第二提示信息显示模块,被配置为在所述接收用户对不同系统环境设置的所述指纹验证安全等级和对不同指纹验证安全等级设置的所述特征阈值之前,显示提示信息,以提示用户为系统环境设置所述指纹验证安全等级;
    第二接收显示模块,被配置为接收用户的触发操作,并根据所述触发操作显示指纹验证安全等级设置页面。
  19. 一种指纹识别装置,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    获取指纹图像,并提取所述指纹图像的特征信息;
    获得当前应用环境信息,并根据所述当前应用环境信息获得指纹验证安全等级对应的特征阈值;
    将提取的所述特征信息与预存的验证特征信息进行比对,若比对结果达到所述对应的特征阈值,则指纹识别成功,若比对结果未达到所述对应的特征阈值,则指纹识别失败。
PCT/CN2015/098857 2015-08-21 2015-12-25 指纹识别方法及装置 WO2017031888A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2017535957A JP2017537414A (ja) 2015-08-21 2015-12-25 指紋認証方法及びその装置、プログラム及び記録媒体
KR1020167004809A KR101772829B1 (ko) 2015-08-21 2015-12-25 지문 인식 방법, 장치, 프로그램 및 기록매체
RU2016122619A RU2643473C2 (ru) 2015-08-21 2015-12-25 Способ и аппаратура для идентификации отпечатков пальцев
MX2016003774A MX362444B (es) 2015-08-21 2015-12-25 Metodo y aparato para identificacion de huella dactilar.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510520041.8A CN106709399B (zh) 2015-08-21 2015-08-21 指纹识别方法及装置
CN201510520041.8 2015-08-21

Publications (1)

Publication Number Publication Date
WO2017031888A1 true WO2017031888A1 (zh) 2017-03-02

Family

ID=56684459

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/098857 WO2017031888A1 (zh) 2015-08-21 2015-12-25 指纹识别方法及装置

Country Status (8)

Country Link
US (1) US20170053149A1 (zh)
EP (1) EP3133528B1 (zh)
JP (1) JP2017537414A (zh)
KR (1) KR101772829B1 (zh)
CN (1) CN106709399B (zh)
MX (1) MX362444B (zh)
RU (1) RU2643473C2 (zh)
WO (1) WO2017031888A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112665137A (zh) * 2020-12-14 2021-04-16 格力电器(武汉)有限公司 一种空调控制方法、装置、存储介质及空调

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10733593B2 (en) * 2011-07-18 2020-08-04 Rabih S. Ballout Kit, system and associated method and service for providing a platform to prevent fraudulent financial transactions
CN105488464B (zh) * 2015-11-26 2019-02-19 小米科技有限责任公司 指纹识别方法及装置
CN106951754B (zh) * 2016-01-06 2018-08-31 阿里巴巴集团控股有限公司 一种信息图像显示方法及装置
CN106228054A (zh) * 2016-08-02 2016-12-14 北京小米移动软件有限公司 身份验证方法和装置
US20180157395A1 (en) * 2016-12-07 2018-06-07 Lg Electronics Inc. Mobile terminal and method for controlling the same
WO2018119566A1 (zh) * 2016-12-26 2018-07-05 深圳市汇顶科技股份有限公司 一种指纹识别引导方法及装置
EP3631665A4 (en) * 2017-05-23 2021-03-03 Fingerprint Cards AB METHOD AND ELECTRONIC DEVICE FOR AUTHENTICATING A USER
JP2019008702A (ja) 2017-06-28 2019-01-17 トヨタ自動車株式会社 認証装置
CN109255278A (zh) * 2017-07-12 2019-01-22 上海耕岩智能科技有限公司 一种同步采集指纹信息的方法和装置
CN107493368B (zh) * 2017-08-22 2020-09-22 Oppo广东移动通信有限公司 解锁方法及相关产品
CN107580114B (zh) * 2017-08-24 2020-07-28 Oppo广东移动通信有限公司 生物识别方法、移动终端以及计算机可读存储介质
WO2019041243A1 (zh) * 2017-08-31 2019-03-07 华为技术有限公司 指纹传感器功能的验证方法及终端
CN107609372A (zh) * 2017-09-07 2018-01-19 广东欧珀移动通信有限公司 指纹识别方法、装置、移动终端及存储介质
CN111095246B (zh) 2017-09-20 2021-05-07 指纹卡有限公司 用于认证用户的方法和电子设备
JP2019175289A (ja) * 2018-03-29 2019-10-10 株式会社日本総合研究所 動き評価装置及び動き評価プログラム
CN109359453B (zh) * 2018-09-04 2021-08-24 Oppo(重庆)智能科技有限公司 解锁方法及相关产品
EP3674856B1 (en) * 2018-09-25 2023-04-12 Shenzhen Goodix Technology Co., Ltd. Multi-sensor-based on-screen fingerprint collection method and system and electronic device
CN109740538B (zh) * 2019-01-03 2021-07-27 Oppo广东移动通信有限公司 指纹采集方法、电子装置及计算机可读存储介质
CN109891431B (zh) * 2019-01-14 2023-05-05 深圳市汇顶科技股份有限公司 基于多安全环境的指纹识别方法、指纹识别系统和电子设备
CN110020619A (zh) * 2019-03-28 2019-07-16 维沃移动通信有限公司 一种指纹识别方法及移动终端
CN110472504A (zh) * 2019-07-11 2019-11-19 华为技术有限公司 一种人脸识别的方法和装置
CN110472520B (zh) * 2019-07-24 2022-07-19 维沃移动通信有限公司 一种身份识别方法及移动终端
CN113052145A (zh) * 2021-04-30 2021-06-29 中国银行股份有限公司 一种人脸识别结果的差异化判断方法和装置
CN114727294A (zh) * 2022-05-19 2022-07-08 北京梦蓝杉科技有限公司 一种通信用身份识别方法及其系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281539A (zh) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 移动终端及其应用程序登录方法
CN104077576A (zh) * 2014-07-03 2014-10-01 南昌欧菲生物识别技术有限公司 指纹识别方法及具有指纹识别功能的终端设备
CN104715170A (zh) * 2013-12-13 2015-06-17 中国移动通信集团公司 一种操作权限的确定方法和用户终端
EP2892002A2 (en) * 2014-01-02 2015-07-08 Samsung Electronics Co., Ltd Method of executing function of electronic device and electronic device using the same

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6895104B2 (en) * 2001-02-16 2005-05-17 Sac Technologies, Inc. Image identification system
JP2003091509A (ja) * 2001-09-17 2003-03-28 Nec Corp 携帯通信機器の個人認証方法およびそれを記述したプログラム
JP2003248661A (ja) * 2002-02-25 2003-09-05 Sony Corp 認証処理装置および認証処理方法、情報処理装置および情報処理方法、認証処理システム、記録媒体、並びにプログラム
KR101250097B1 (ko) * 2007-07-11 2013-04-03 후지쯔 가부시끼가이샤 이용자 인증 판정 장치, 이용자 인증 판정 시스템, 이용자 인증 판정 프로그램을 기억하는 컴퓨터 판독 가능한 기억 매체, 및 이용자 인증 판정 방법
JP2010198384A (ja) * 2009-02-25 2010-09-09 Kyocera Corp 通信端末装置
JP2013097760A (ja) * 2011-11-07 2013-05-20 Toshiba Corp 認証システム、端末装置、認証プログラム、認証方法
US8836472B2 (en) * 2011-11-23 2014-09-16 Blackberry Limited Combining navigation and fingerprint sensing
KR20150027329A (ko) * 2013-08-29 2015-03-12 주식회사 팬택 지문 인식기를 구비한 단말 및 이의 동작 방법
US9343068B2 (en) * 2013-09-16 2016-05-17 Qualcomm Incorporated Method and apparatus for controlling access to applications having different security levels
CN104077516B (zh) * 2014-06-26 2018-04-27 华为技术有限公司 一种生物认证方法及终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281539A (zh) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 移动终端及其应用程序登录方法
CN104715170A (zh) * 2013-12-13 2015-06-17 中国移动通信集团公司 一种操作权限的确定方法和用户终端
EP2892002A2 (en) * 2014-01-02 2015-07-08 Samsung Electronics Co., Ltd Method of executing function of electronic device and electronic device using the same
CN104077576A (zh) * 2014-07-03 2014-10-01 南昌欧菲生物识别技术有限公司 指纹识别方法及具有指纹识别功能的终端设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112665137A (zh) * 2020-12-14 2021-04-16 格力电器(武汉)有限公司 一种空调控制方法、装置、存储介质及空调

Also Published As

Publication number Publication date
EP3133528A1 (en) 2017-02-22
JP2017537414A (ja) 2017-12-14
KR20170033802A (ko) 2017-03-27
EP3133528B1 (en) 2019-11-13
US20170053149A1 (en) 2017-02-23
MX362444B (es) 2019-01-18
CN106709399A (zh) 2017-05-24
RU2016122619A (ru) 2017-12-13
RU2643473C2 (ru) 2018-02-01
MX2016003774A (es) 2017-04-27
KR101772829B1 (ko) 2017-08-29
CN106709399B (zh) 2021-02-09

Similar Documents

Publication Publication Date Title
WO2017031888A1 (zh) 指纹识别方法及装置
US10706173B2 (en) Method and device for displaying notification information
US10721196B2 (en) Method and device for message reading
US10452890B2 (en) Fingerprint template input method, device and medium
US9904774B2 (en) Method and device for locking file
WO2016107030A1 (zh) 通知信息显示方法及装置
US20160028741A1 (en) Methods and devices for verification using verification code
WO2021031609A1 (zh) 活体检测方法及装置、电子设备和存储介质
WO2016112699A1 (zh) 切换显示模式的方法及装置
WO2017059638A1 (zh) 指纹识别方法及装置
WO2016131303A1 (zh) 一种进行转账处理的方法和装置
WO2015196708A1 (zh) 文件锁定方法和装置
WO2017035994A1 (zh) 外接设备的连接方法及装置
WO2017071050A1 (zh) 具有触摸屏的终端的防误触方法及装置
JP6230762B2 (ja) 指紋識別方法、装置、プログラム、記録媒体および移動端末
US20170185988A1 (en) Mpayment method and apparatus
WO2018133387A1 (zh) 指纹识别方法及装置
WO2016155231A1 (zh) 网络接入方法及装置
WO2016082461A1 (zh) 推荐信息获取方法、终端及服务器
JP2017506381A (ja) モバイルターミナル、バーチャルボタンを処理する方法
WO2016188065A1 (zh) 云名片推荐方法及装置
WO2023040202A1 (zh) 人脸识别方法及装置、电子设备和存储介质
CN107133551B (zh) 指纹验证方法及装置
WO2017211021A1 (zh) 应用触发方法及装置
US10817702B2 (en) Method, terminal, and computer-readable storage medium for processing fingerprint

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2017535957

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20167004809

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2016/003774

Country of ref document: MX

ENP Entry into the national phase

Ref document number: 2016122619

Country of ref document: RU

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15902156

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15902156

Country of ref document: EP

Kind code of ref document: A1