WO2017035963A1 - Procédé et système de reconnaissance d'empreinte digitale - Google Patents

Procédé et système de reconnaissance d'empreinte digitale Download PDF

Info

Publication number
WO2017035963A1
WO2017035963A1 PCT/CN2015/095435 CN2015095435W WO2017035963A1 WO 2017035963 A1 WO2017035963 A1 WO 2017035963A1 CN 2015095435 W CN2015095435 W CN 2015095435W WO 2017035963 A1 WO2017035963 A1 WO 2017035963A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
terminal
comparison result
fingerprints
stored
Prior art date
Application number
PCT/CN2015/095435
Other languages
English (en)
Chinese (zh)
Inventor
杨俊�
饶俊成
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017035963A1 publication Critical patent/WO2017035963A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to the field of fingerprint recognition technology, and in particular to a fingerprint identification method and a fingerprint identification system.
  • Fingerprint unlocking because of its convenience and speed, has gradually become popular on terminals (such as mobile phones), but in the related art, the fingerprint lock on the terminal is directly set on the terminal, so when the user is in an unconscious state (sleep, coma) Someone can maliciously use the user's fingerprint to directly unlock the user's terminal, so that the fingerprint lock on the terminal can not ensure the security of the terminal, thereby reducing the security level of the fingerprint lock.
  • the fingerprint is unlocked, the user's fingerprint is pre-stored on the terminal, and the fingerprint is easily stolen by the hacker, so that the fingerprint lock on the terminal is more unsafe.
  • the invention is based on the above problems, and proposes a fingerprint identification method and system which are difficult to unlock when the user has a high security level and the stored fingerprint is not easily stolen by a hacker.
  • an aspect of the present invention provides a fingerprint identification method, including: collecting at least one first fingerprint by using a first collection module; collecting at least one second fingerprint by using a second collection module; The first fingerprint and each of the second fingerprints are compared with a plurality of pre-stored fingerprint samples and a comparison result is obtained; and a preset operation is performed according to the comparison result.
  • a plurality of fingerprint collection modules are designed, and each collection module can also set the number of fingerprints to be collected according to actual needs, so that when the user operates the terminal (such as a mobile phone), the fingerprint needs to be input multiple times. Fingerprint recognition, and only after fingerprint recognition by the corresponding module The row operates accordingly, otherwise, the terminal cannot be operated, thereby improving the reliability of fingerprint recognition.
  • the acquisition module has Two or two acquisition modules can be set separately, and the two acquisition modules can also perform multiple acquisitions and multiple verifications according to preset settings. Therefore, unless the user voluntarily unlocks, the user is in an unconscious state. At the time, it is difficult for others to pass fingerprinting through experiments, thereby improving the security level of fingerprint recognition when the user is in an unconscious state.
  • the first collection module is located on the terminal, and the second collection module is located in an external device connectable to the terminal; the multiple fingerprint samples are stored in In the terminal and/or in the external device.
  • comparing each of the first fingerprint and each of the second fingerprints with a pre-stored plurality of fingerprint samples and obtaining a comparison result respectively comprises: separately Comparing the first fingerprint with the fingerprint sample stored in the terminal to obtain a first comparison result; comparing each of the second fingerprints with a fingerprint sample stored in the external device to obtain a second comparison result, And transmitting the second comparison result to the terminal; determining the comparison result according to the first comparison result and the second comparison result.
  • the second comparison result is transmitted to the terminal by wire or wirelessly.
  • comparing each of the first fingerprint and each of the second fingerprints with a pre-stored plurality of fingerprint samples and obtaining a comparison result specifically includes: Transmitting the second fingerprint to the terminal; respectively comparing each of the first fingerprints with a fingerprint sample stored in the terminal to obtain a third comparison result; respectively, each of the second fingerprints and the second fingerprint The fingerprint samples stored in the terminal are compared to obtain a fourth comparison result; and the comparison result is determined according to the third comparison result and the fourth comparison result.
  • the second fingerprint is transmitted to the terminal by wire or wirelessly.
  • the preset operation is: completely unlocking the terminal and entering a private operation mode; when the comparison result is Each of the first fingerprints matches the stored fingerprint samples, but when any one of the second fingerprints does not match the stored fingerprint samples, the preset operation is: semi-unlocking The terminal enters a normal operation mode; and when the comparison result is that none of the fingerprints in each of the first fingerprints matches the stored fingerprint samples, whether the second fingerprint is stored or not The fingerprint samples are matched, and the preset operations are: no response to any operation.
  • the user can also set the terminal into a plurality of other working modes according to his actual needs, which are not enumerated here.
  • a second aspect of the present invention provides a fingerprint identification system, including: a storage module, wherein the storage module stores a plurality of fingerprint samples; a first collection module is configured to collect at least one first fingerprint; and a second collection module is configured to collect At least one second fingerprint; a processing module, connected to the first collection module, the second collection module, and the storage module, for respectively using each of the first fingerprint and each of the second fingerprints The plurality of fingerprint samples are compared, and a comparison result is obtained; the execution module is connected to the processing module, and is configured to perform a preset operation according to the comparison result.
  • a plurality of fingerprint collection modules are designed, and each collection module can also set the number of fingerprints to be collected according to actual needs, so that when the user operates the terminal, the fingerprint needs to be input multiple times for fingerprint recognition, and Only after the fingerprint recognition of the corresponding module can the terminal be operated accordingly, otherwise, the terminal cannot be operated, thereby improving the reliability of fingerprint recognition.
  • the acquisition module has Two or two acquisition modules can be set separately, and the two acquisition modules can also be collected multiple times and verified multiple times according to preset settings. Therefore, unless the user voluntarily unlocks, it is difficult for others to pass the test. Through fingerprint recognition, the security level of fingerprint recognition when the user is in an unconscious state is improved.
  • the first collection module is located on the terminal; the second collection module is located on an external device connectable to the terminal; the plurality of fingerprint samples are stored in the terminal and / or in the external device.
  • the processing module includes: a first comparison module, located in the terminal, for respectively comparing each of the first fingerprints with a fingerprint sample stored in the terminal Obtaining a first comparison result; a second comparison module, located in the external device, for respectively Comparing each of the second fingerprints with a fingerprint sample stored in the external device to obtain a second comparison result; a determining module, located in the terminal, according to the first comparison result and the second The comparison result determines the comparison result.
  • the method further includes: a sending module, located on the external device, configured to transmit the second comparison result to the terminal by wire or wirelessly.
  • the processing module includes: a comparison module, located in the terminal, for respectively comparing each of the first fingerprints with a fingerprint sample stored in the terminal Obtaining a third comparison result, and for respectively comparing each of the second fingerprints with a fingerprint sample stored in the terminal to obtain a fourth comparison result; and determining a module, located in the terminal, for The third comparison result and the fourth comparison result determine the comparison result.
  • the method further includes: a sending module, located on the external device, configured to transmit the second fingerprint to the terminal by wire or wirelessly.
  • the preset operation performed by the execution module is to completely unlock the terminal and start a private operation mode; in the comparison result, each of the first fingerprints matches the stored fingerprint samples, but each of the first When the fingerprint of the two fingerprints does not match the stored fingerprint sample, the preset operation performed by the execution module is to semi-unlock the terminal and start the normal operation mode; and the comparison result is When the fingerprint of the first fingerprint does not match the stored fingerprint sample, whether the fingerprint of the second fingerprint matches the stored fingerprint sample, the execution module performs the The default operation does not respond to any operation.
  • the user can also set the terminal into a plurality of other working modes according to his actual needs, which are not enumerated here.
  • FIG. 1 is a flow chart showing a fingerprint identification method according to an embodiment of the present invention
  • FIG. 2 is a block diagram showing the structure of a fingerprint identification system in accordance with one embodiment of the present invention.
  • FIG. 3 is a block diagram showing the structure of a fingerprint identification system according to another embodiment of the present invention.
  • FIG. 4 is a flow chart showing the fingerprint identification system provided in FIG. 3;
  • FIG. 5A is a schematic diagram showing a state of a fingerprint identification system according to still another embodiment of the present invention.
  • FIG. 5B shows another state diagram of the fingerprint recognition system provided in FIG. 5A.
  • FIG. 1 shows a flow chart of a fingerprint identification method according to an embodiment of the present invention.
  • an aspect of the present invention provides a fingerprint identification method, including: Step 102: Collecting at least one first fingerprint by using a first collection module; Step 104, collecting at least one second fingerprint by using a second collection module. Step 106: Compare each of the collected first fingerprints and each of the second fingerprints with a pre-stored plurality of fingerprint samples to obtain a comparison result; Step 108: Perform a preset operation according to the comparison result .
  • a plurality of fingerprint collection modules are designed, and each collection module can also set the number of fingerprints to be collected according to actual needs, so that when the user operates the terminal (such as a mobile phone), the fingerprint needs to be input multiple times. Fingerprint recognition, and only after the fingerprint recognition of the corresponding module, the terminal can be operated accordingly; otherwise, the terminal can not be operated, thereby improving the reliability of fingerprint recognition.
  • the acquisition module has two or two. The acquisition module can be set separately, and the two acquisition modules can also perform multiple acquisitions and multiple verifications according to the preset settings. Therefore, unless the user voluntarily unlocks, it is difficult for others to pass the fingerprint identification through experiments. Thereby, the security level of fingerprint recognition when the user is in an unconscious state is improved.
  • the first collection module is located on the terminal, and the second collection module is located in an external device connectable to the terminal; the multiple fingerprint samples are stored In the terminal and/or in the external device.
  • the first collection module is located on the terminal, and the second collection module is located in the external device. Therefore, when the user normally uses the terminal, the second collection module is hidden in the external device, and therefore, when the user is in an unconscious state At the same time, the other party can only use the first acquisition module to semi-unlock the terminal, and cannot use the second acquisition module to completely unlock the terminal. Therefore, even if someone passes the fingerprint recognition on the terminal in the unconscious state of the user, at most, the terminal can perform most simple operations on the terminal, and cannot steal the private information of the user in the terminal, thereby improving the security performance of the terminal. When the user needs to completely unlock the terminal, the terminal only needs to be connected to the external device, so that the terminal can be completely unlocked quickly.
  • the fingerprint sample may be stored in the terminal and may be stored in the external device, but preferably, the fingerprint sample related to the first fingerprint is stored in the terminal, and the fingerprint sample related to the second fingerprint is stored in the external device. . Because the fingerprint samples are all stored in the terminal, the fingerprint is easily stolen by the hacker, and the fingerprint samples are all stored in the external device, and the user needs to connect the terminal with the external device each time, thereby bringing fingerprint recognition to the user. Inconvenient, the fingerprint samples are stored separately. On the one hand, the user can realize the semi-unlocking of the terminal by using only the terminal, so that the terminal can be simply operated, and on the other hand, the fingerprint samples stored in the external device are not easily stolen by the hacker. This ensures the security of the terminal.
  • comparing each of the first fingerprint and each of the second fingerprints with a pre-stored plurality of fingerprint samples and obtaining a comparison result respectively comprise: respectively: each of the first The fingerprint is compared with the fingerprint sample stored in the terminal to obtain a first comparison result; each of the second fingerprints is compared with a fingerprint sample stored in the external device to obtain a second comparison result, and the Transmitting the second comparison result to the terminal; determining the comparison result according to the first comparison result and the second comparison result.
  • the second comparison result is transmitted to the terminal by wire or wirelessly.
  • the external device can be directly connected to the terminal, and the second comparison result in the external device can be transmitted to the terminal.
  • the terminal is a portable mobile terminal such as a mobile phone
  • the earphone of the mobile phone can be utilized.
  • Hole that is, a headphone plug can be set on the external device, so that the wired connection between the external device and the terminal can be realized by using the cooperation of the earphone plug and the earphone hole.
  • the external device and the terminal can also be connected by using a wireless manner.
  • the connection between the external device and the terminal can be realized through various wireless methods such as Bluetooth and WIFI.
  • comparing each of the first fingerprint and each of the second fingerprints with a pre-stored plurality of fingerprint samples and obtaining a comparison result specifically includes: transmitting each of the second fingerprints To the terminal; respectively comparing each of the first fingerprints with a fingerprint sample stored in the terminal to obtain a third comparison result; respectively, each of the second fingerprints and a fingerprint sample stored in the terminal Comparing, a fourth comparison result is obtained; and the comparison result is determined according to the third comparison result and the fourth comparison result.
  • the external device is only used to collect the second fingerprint and transmit the collected second fingerprint to the terminal, so that the terminal can control the terminal by comparing the first fingerprint, the second fingerprint, and the pre-stored fingerprint sample. Perform the corresponding preset operation.
  • This solution can reduce the workload of external devices, thereby reducing the performance requirements of external devices, and at the same time, the external devices can be designed to be light and easy to carry.
  • the second fingerprint is transmitted to the terminal by wire or wirelessly.
  • the external device can be directly connected to the terminal, and the second fingerprint collected by the external device can be transmitted to the terminal.
  • the terminal is a portable mobile terminal such as a mobile phone
  • the earphone hole of the mobile phone can be utilized. That is, a headphone plug can be set on the external device, so that the wired connection between the external device and the terminal can be realized by using the cooperation of the earphone plug and the earphone hole.
  • the external device and the terminal can also be connected by using a wireless manner.
  • the connection between the external device and the terminal can be realized through various wireless methods such as Bluetooth and WIFI.
  • the preset operation To: completely unlock the terminal and enter a private operation mode; when the comparison result is that each of the first fingerprints matches the stored fingerprint samples, but any fingerprint in each of the second fingerprints When the stored fingerprint samples do not match, the preset operation is: semi-unlocking the terminal and entering a normal operation mode; and when the comparison result is any fingerprint and stored in each of the first fingerprints When the fingerprint samples do not match, whether the second fingerprint matches the stored fingerprint samples, the preset operation is: no response to any operation.
  • the user can set the terminal into multiple modes according to actual needs, so that the terminal can start the corresponding mode according to the matching of the input fingerprint and the pre-stored fingerprint.
  • the user can divide the terminal into multiple terminals.
  • the normal operation mode and the private operation mode so when the first fingerprint input by the user matches the pre-stored fingerprint, but the second fingerprint input by the user does not match the pre-stored fingerprint, only the normal operation mode of the terminal is opened, In the mode, the user can simply operate the terminal, such as listening to songs, setting an alarm clock, and answering a call.
  • the terminal can open the private operation mode, in which the user can completely operate the terminal, and then the user Some passwords in the terminal can be changed and payment software in the terminal can be used.
  • the terminal does not respond to any operation regardless of whether the second fingerprint collected by the second collection module is consistent with the sample fingerprint.
  • the technical solution by designing multiple fingerprint verification, correspondingly multiple verifications to correspond to multiple modes of the terminal, so that when the user is in an unconscious state, it is more difficult to unlock the terminal, thereby improving the reliability of the fingerprint identification method.
  • the user can also set the terminal into a plurality of other working modes according to his actual needs, which are not enumerated here.
  • FIG. 2 shows a block diagram of the structure of a fingerprint identification system 200 in accordance with one embodiment of the present invention.
  • a second aspect of the present invention provides a fingerprint identification system 200, including: a storage module 202, a first collection module 204, a second collection module 206, a processing module 208, and an execution module 210.
  • the storage module 202 stores a plurality of fingerprint samples.
  • the first collection module 204 is used for mining Collecting at least one first fingerprint;
  • the second collection module 206 is configured to collect at least one second fingerprint.
  • the processing module 208 is connected to the first collection module 204, the second collection module 206, and the storage module 202, and configured to respectively use each of the first fingerprint and each of the second fingerprints and multiple The fingerprint samples are compared and the comparison results are obtained.
  • the execution module 210 is connected to the processing module 208, and is configured to perform a preset operation according to the comparison result.
  • a plurality of fingerprint collection modules are designed, and each collection module can also set the number of fingerprints to be collected according to actual needs, so that when the user operates the terminal, the fingerprint needs to be input multiple times for fingerprint recognition, and Only after the fingerprint recognition of the corresponding module can the terminal be operated accordingly, otherwise, the terminal cannot be operated, thereby improving the reliability of fingerprint recognition.
  • the acquisition module has Two or two acquisition modules can be set separately, and the two acquisition modules can also be collected multiple times and verified multiple times according to preset settings. Therefore, unless the user voluntarily unlocks, it is difficult for others to pass the test. Through fingerprint recognition, the security level of fingerprint recognition when the user is in an unconscious state is improved.
  • the first collection module 204 is located on the terminal; the second collection module 206 is located on an external device connectable to the terminal; and the plurality of fingerprint samples are stored in the terminal. And/or in the external device.
  • the first collection module 204 is located on the terminal, and the second collection module 206 is located in the external device. Therefore, when the user normally uses the terminal, the second collection module 206 is hidden in the external device, and therefore, when the user When in the unconscious state, the other party can only use the first acquisition module 204 to semi-unlock the terminal, and the second acquisition module 206 cannot completely unlock the terminal. Therefore, even if someone passes the fingerprint recognition on the terminal in the unconscious state of the user, at most, the terminal can perform most simple operations on the terminal, and cannot steal the private information of the user in the terminal, thereby improving the security performance of the terminal. When the user needs to completely unlock the terminal, the terminal only needs to be connected to the external device, so that the terminal can be completely unlocked quickly.
  • the fingerprint sample may be stored in the terminal and may be stored in the external device, but preferably, the fingerprint sample related to the first fingerprint is stored in the terminal, and is related to the second fingerprint.
  • the fingerprint samples are stored in an external device. Because the fingerprint samples are all stored in the terminal, the fingerprint is easily stolen by the hacker, and the fingerprint samples are all stored in the external device, and the user needs to connect the terminal with the external device each time, thereby bringing fingerprint recognition to the user. Inconvenient, the fingerprint samples are stored separately. On the one hand, the user can realize the semi-unlocking of the terminal by using only the terminal, so that the terminal can be simply operated, and on the other hand, the fingerprint samples stored in the external device are not easily stolen by the hacker. This ensures the security of the terminal.
  • the processing module 208 includes: a first comparison module, located in the terminal, configured to compare each of the first fingerprints with a fingerprint sample stored in the terminal, respectively, to obtain a first comparison result; the second comparison module is located in the external device, and is configured to compare each of the second fingerprints with a fingerprint sample stored in the external device to obtain a second comparison result; Located in the terminal, configured to determine the comparison result according to the first comparison result and the second comparison result.
  • the information data inside is not easily stolen by the hacker through the terminal, and on the other hand, it is not easy to cause data loss in the external device.
  • the method further includes: a sending module, located on the external device, configured to transmit the second comparison result to the terminal by wire or wirelessly.
  • the external device can be directly connected to the terminal, and the second comparison result in the external device can be transmitted to the terminal.
  • the terminal is a portable mobile terminal such as a mobile phone
  • the earphone of the mobile phone can be utilized.
  • Hole that is, a headphone plug can be set on the external device, so that the wired connection between the external device and the terminal can be realized by using the cooperation of the earphone plug and the earphone hole.
  • the external device and the terminal can also be connected by using a wireless manner.
  • the connection between the external device and the terminal can be realized through various wireless methods such as Bluetooth and WIFI.
  • the processing module 208 includes: a comparison module, located in the terminal, configured to compare each of the first fingerprints with a fingerprint sample stored in the terminal, Obtaining a third comparison result, and for respectively comparing each of the second fingerprints with a fingerprint sample stored in the terminal to obtain a fourth comparison result; a determining module, located in the terminal, according to the The third comparison result and the fourth comparison result determine the comparison result.
  • the external device is only used to collect the second fingerprint and transmit the collected second fingerprint to the terminal, so that the terminal can control the terminal by comparing the first fingerprint, the second fingerprint, and the pre-stored fingerprint sample. Perform the corresponding preset operation.
  • This solution can reduce the workload of external devices, thereby reducing the performance requirements of external devices, and at the same time, the external devices can be designed to be light and easy to carry.
  • the method further includes: a sending module, located on the external device, configured to transmit the second fingerprint to the terminal by wire or wirelessly.
  • the external device can be directly connected to the terminal, and the second fingerprint collected by the external device can be transmitted to the terminal.
  • the terminal is a portable mobile terminal such as a mobile phone
  • the earphone hole of the mobile phone can be utilized. That is, a headphone plug can be set on the external device, so that the wired connection between the external device and the terminal can be realized by using the cooperation of the earphone plug and the earphone hole.
  • the external device and the terminal can also be connected by using a wireless manner.
  • the connection between the external device and the terminal can be realized through various wireless methods such as Bluetooth and WIFI.
  • the execution module 210 is configured when the comparison result is that each of the first fingerprints matches a stored fingerprint sample and each of the second fingerprints matches a stored fingerprint sample.
  • the preset operation performed is to completely unlock the terminal and enable a private operation mode; in the comparison result, each of the first fingerprints matches the stored fingerprint samples, but each of the second fingerprints When any one of the fingerprints does not match the stored fingerprint sample, the preset operation performed by the execution module 210 is to semi-unlock the terminal and turn on the normal operation mode; and the comparison result is for each of the When the fingerprint of the first fingerprint does not match the stored fingerprint sample, whether the fingerprint of the second fingerprint matches the stored fingerprint sample, the execution module 210 performs the The default operation does not respond to any operation.
  • the user can set the terminal into multiple modes according to actual needs, so that the terminal can enable the terminal to start the corresponding mode according to the matching of the input fingerprint and the pre-stored fingerprint.
  • the user can divide the terminal into For normal operating mode and private operating mode, so when the user enters the first The fingerprint matches the pre-stored fingerprint, but when the second fingerprint input by the user does not match the pre-stored fingerprint, only the normal operation mode of the terminal is opened. In this mode, the user can simply operate the terminal, such as listening. Song, set alarm clock, pick up the phone, etc.
  • the terminal can open the private operation mode, in which the user can completely operate the terminal, and then the user Some passwords in the terminal can be changed and payment software in the terminal can be used.
  • the terminal does not respond to any operation regardless of whether the second fingerprint collected by the second collection module 206 is consistent with the sample fingerprint.
  • the technical solution by designing multiple fingerprint verification, correspondingly multiple verifications and multiple modes of the terminal, so that when the user is in an unconscious state, it is more difficult to unlock the terminal and operate the terminal, thereby improving the reliability of the fingerprint identification method. .
  • the user can also set the terminal into a plurality of other working modes according to his actual needs, which are not enumerated here.
  • FIG. 3 is a schematic block diagram showing the structure of a fingerprint identification system 300 according to another embodiment of the present invention.
  • the fingerprint identification system 300 includes a terminal 310 and an external device 320.
  • the external device 320 includes a second storage module 322 that stores fingerprint samples, a second collection module 324 that collects a second fingerprint, and a second fingerprint and fingerprint.
  • the sample compares and generates a second comparison mode 326 of the second comparison result and a sending module 328 for transmitting the second comparison result to the terminal 310.
  • the terminal 310 includes: a first storage module 312 that stores the fingerprint sample, and acquires the first fingerprint.
  • the comparison result executes the execution module 319 of the preset operation.
  • FIG. 4 shows a workflow diagram of the fingerprint identification system 300, which specifically includes the following steps:
  • Step 401 Acquire a first fingerprint by using a first collection module.
  • Step 402 Collect a second fingerprint by using the second collection module.
  • Step 403 the first comparison module determines whether the first fingerprint and the fingerprint sample in the first storage module match, wherein if the matching step 404 is performed, if not, the step 407 is performed;
  • Step 404 the second comparison module determines whether the second fingerprint and the fingerprint sample in the second storage module are matched, wherein if there is no match, step 405 is performed, if yes, step 406 is performed;
  • step 405 a normal mode of operation is performed.
  • step 406 a private mode of operation is performed.
  • Step 407 does not respond to any operation.
  • step 403 if the result of the determination in step 403 is YES, if the second acquisition module does not collect the second fingerprint, the terminal directly performs step 405.
  • still another embodiment of the present invention further provides a fingerprint authentication system 500, which includes a mobile phone 510 and a peripheral device 520, as shown in FIG. 5A, externally.
  • Device 520 can be inserted into the earphone jack of the handset through earphone plug 524 to effect a connection between handset 510 and external device 520.
  • the first acquisition module 512 for collecting the first fingerprint is disposed on the mobile phone 510
  • the second collection module 522 for collecting the second fingerprint is disposed on the external device. Therefore, the user may first use the mobile phone in the process as shown in FIG. 5A. As shown, the peripheral device 520 is inserted into the mobile phone 510 by using the earphone plug 524, and then, as shown in FIG. 5B, the first fingerprint is input into the mobile phone 510 through the first collecting module 512, and the second fingerprint is utilized. The second acquisition module 522 is input to the external device 520, so that the first fingerprint of the input is matched with the fingerprint sample stored in the mobile phone 510 by using the mobile phone 510, and whether the input second fingerprint is related to the external device 520. The stored fingerprint samples match.
  • the fingerprint authentication on the mobile phone 510 passes, so that the user can perform normal mode operation on the mobile phone, and if the second fingerprint and the external device 520 The stored fingerprint samples also match, and the fingerprint on the external device 520 is also authenticated, so that the user can perform the private mode operation on the mobile phone, and vice versa. If the fingerprint authentication on the external device 520 passes, and the fingerprint authentication on the mobile phone 510 fails, the mobile phone 510 does not respond to any operation. Therefore, the mobile phone is in a self-locking state, thereby preventing file information in the mobile phone from being maliciously stolen.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Image Input (AREA)
  • Telephone Function (AREA)

Abstract

La présente invention concerne un procédé et un système de reconnaissance d'empreinte digitale, le procédé de reconnaissance d'empreinte digitale consistant à : collecter au moins une première empreinte digitale par utilisation d'un premier module de collecte ; collecter au moins une seconde empreinte digitale par utilisation d'un second module de collecte ; comparer respectivement chacune desdites premières empreintes digitales et chacune desdites secondes empreintes digitales à une pluralité d'échantillons d'empreinte digitale préstockés pour obtenir un résultat de comparaison ; et réaliser une opération préréglée selon le résultat de comparaison. La solution technique dans la présente invention adopte une conception de multiples modules de collecte d'empreinte digitale, de telle sorte que, lorsqu'un utilisateur utilise un terminal, le terminal peut être utilisé de manière correspondante uniquement après la collecte correcte d'empreintes digitales par les multiples modules de collecte, permettant ainsi d'améliorer la fiabilité de reconnaissance d'empreinte digitale. En outre, le second module de collecte est agencé de préférence sur un dispositif périphérique en dehors du terminal. En conséquence, lorsque l'utilisateur utilise le terminal normalement, le second module de collecte est caché dans le dispositif périphérique ; lorsque l'utilisateur est dans un état inconscient, d'autres ne sont pas susceptibles d'utiliser le second module de collecte pour réaliser une reconnaissance d'empreinte digitale.
PCT/CN2015/095435 2015-08-31 2015-11-24 Procédé et système de reconnaissance d'empreinte digitale WO2017035963A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510548450.9A CN105184135A (zh) 2015-08-31 2015-08-31 指纹识别方法及指纹识别系统
CN201510548450.9 2015-08-31

Publications (1)

Publication Number Publication Date
WO2017035963A1 true WO2017035963A1 (fr) 2017-03-09

Family

ID=54906209

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095435 WO2017035963A1 (fr) 2015-08-31 2015-11-24 Procédé et système de reconnaissance d'empreinte digitale

Country Status (2)

Country Link
CN (1) CN105184135A (fr)
WO (1) WO2017035963A1 (fr)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933506A (zh) * 2016-03-31 2016-09-07 乐视控股(北京)有限公司 移动终端解锁方法、装置、移动终端以及耳机
CN106022044A (zh) * 2016-05-20 2016-10-12 广东欧珀移动通信有限公司 智能终端的指纹响应方法及装置
CN108052820B (zh) * 2016-05-31 2021-06-15 Oppo广东移动通信有限公司 一种解锁控制方法及终端设备和相关产品
CN106127003B (zh) * 2016-06-21 2019-04-12 维沃移动通信有限公司 一种指纹识别解锁方法及移动终端
US20190217818A1 (en) * 2016-09-21 2019-07-18 Shenzhen Royole Technologies Co. Ltd. Smart door lock and method for controlling same
CN106446838A (zh) * 2016-09-28 2017-02-22 乐视控股(北京)有限公司 一种指纹识别方法及装置
CN106778508B (zh) * 2016-11-22 2018-09-04 维沃移动通信有限公司 一种指纹识别方法及移动终端
CN106878025B (zh) * 2017-04-24 2023-09-19 乐鑫信息科技(上海)股份有限公司 基于指纹识别权限控制的物联网控制开关及方法
US10574466B1 (en) * 2019-07-11 2020-02-25 Clover Network, Inc. Authenticated external biometric reader and verification device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101825986A (zh) * 2009-03-06 2010-09-08 Lg电子株式会社 移动终端与控制移动终端的方法
CN103838992A (zh) * 2014-03-03 2014-06-04 宇龙计算机通信科技(深圳)有限公司 一种指纹识别方法及终端
CN104036177A (zh) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 智能终端指纹解锁装置及方法
US20140270417A1 (en) * 2013-03-18 2014-09-18 Sunasic Technologies, Inc. Portable fingerprint device with enhanced security
CN104298907A (zh) * 2013-07-15 2015-01-21 联想(北京)有限公司 一种信息处理的方法及电子设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2754719T3 (es) * 2011-10-03 2020-04-20 Accenture Global Services Ltd Motor de correspondencia biométrica
CN102799982A (zh) * 2012-06-29 2012-11-28 深圳市亚略特生物识别科技有限公司 电子交易系统
CN202728169U (zh) * 2012-07-27 2013-02-13 广东好帮手电子科技股份有限公司 一种汽车启动装置及汽车
CN202854880U (zh) * 2012-09-26 2013-04-03 深圳市亚略特生物识别科技有限公司 基于指纹识别手机的短信支付系统
CN103679896B (zh) * 2013-12-13 2016-01-06 黄炳彦 一种用于汽车的门禁系统及其控制方法和汽车

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101825986A (zh) * 2009-03-06 2010-09-08 Lg电子株式会社 移动终端与控制移动终端的方法
US20140270417A1 (en) * 2013-03-18 2014-09-18 Sunasic Technologies, Inc. Portable fingerprint device with enhanced security
CN104298907A (zh) * 2013-07-15 2015-01-21 联想(北京)有限公司 一种信息处理的方法及电子设备
CN103838992A (zh) * 2014-03-03 2014-06-04 宇龙计算机通信科技(深圳)有限公司 一种指纹识别方法及终端
CN104036177A (zh) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 智能终端指纹解锁装置及方法

Also Published As

Publication number Publication date
CN105184135A (zh) 2015-12-23

Similar Documents

Publication Publication Date Title
WO2017035963A1 (fr) Procédé et système de reconnaissance d'empreinte digitale
US11651100B2 (en) System, device and method for enforcing privacy during a communication session with a voice assistant
KR101926052B1 (ko) 출입 관리 시스템 및 방법
US7664961B2 (en) Wireless handheld device with local biometric authentication
EP3163852B1 (fr) Procédé et système de déverrouillage automatique à faible distance pour terminal mobile
US8726371B2 (en) Enhanced security for devices enabled for wireless communications
WO2018086259A1 (fr) Procédé d'authentification et dispositif électronique
US20120075062A1 (en) Method and system for access to secure resources
CN104240346B (zh) 一种基于智能移动终端互联的智能防盗锁系统
US20190087554A1 (en) A mobile device and method providing secure data access, management and storage of mass personal data
US10409975B2 (en) Short-range communication device, function control method and function control system
WO2016082229A1 (fr) Procédé d'authentification d'identité et dispositif pouvant être porté
CN104537291A (zh) 屏幕界面的解锁方式和屏幕界面的解锁装置
WO2019101096A1 (fr) Procédé et dispositif de vérification de sécurité et terminal mobile
US11221824B2 (en) Methods and systems for transferring a session between audible interface and visual interface
US20180373919A1 (en) Fingerprint Lock Control Method and Fingerprint Lock System
CN104134259A (zh) 一种基于身份识别的智能开锁系统及方法
CN105701386A (zh) 一种安全认证方法及装置
SE1650416A1 (en) Secure storage of fingerprint related elements
WO2017071498A1 (fr) Procédé et dispositif d'authentification d'identité
CA3007707C (fr) Systeme, dispositif, methode de mise en application de la confidentialite pendant une session de communication avec un assistant vocal
CN110145187A (zh) 电子锁控制方法、装置、智能箱包及可读存储介质
TW201439991A (zh) 門禁系統及其管制方法
TWI529559B (zh) Computer system with wake-up authentication and its computer equipment
KR20150034336A (ko) 얼굴인식을 통한 운전자 인증 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15902770

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15902770

Country of ref document: EP

Kind code of ref document: A1