WO2017148154A1 - 指纹验证方法及装置 - Google Patents
指纹验证方法及装置 Download PDFInfo
- Publication number
- WO2017148154A1 WO2017148154A1 PCT/CN2016/101861 CN2016101861W WO2017148154A1 WO 2017148154 A1 WO2017148154 A1 WO 2017148154A1 CN 2016101861 W CN2016101861 W CN 2016101861W WO 2017148154 A1 WO2017148154 A1 WO 2017148154A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- fingerprint
- sequence
- pressing
- verified
- module
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1347—Preprocessing; Feature extraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/74—Image or video pattern matching; Proximity measures in feature spaces
- G06V10/75—Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1382—Detecting the live character of the finger, i.e. distinguishing from a fake or cadaver finger
- G06V40/1394—Detecting the live character of the finger, i.e. distinguishing from a fake or cadaver finger using acquisition arrangements
Definitions
- the embodiments of the present disclosure relate to the field of computer technologies, and in particular, to a fingerprint verification method and apparatus.
- the terminal prompts the user to place a single finger on the fingerprint sensor, collects the fingerprint of the finger through the fingerprint sensor, and uses the fingerprint as the reference fingerprint; in the fingerprint verification process, the terminal collects the fingerprint to be matched by the user; Whether the fingerprint to be matched is the same as the reference fingerprint; when the fingerprint to be matched is the same as the reference fingerprint, it is determined that the verification is successful.
- the embodiments of the present disclosure provide a fingerprint verification method and apparatus.
- a fingerprint verification method comprising:
- the generating the to-be-verified fingerprint sequence according to the pressing force and the fingerprint of the N pressing operations comprises:
- the operation type of the N-th press operation is divided, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing operation in which the pressing force does not exceed the preset threshold belongs to the second operation type;
- the generating the to-be-verified fingerprint sequence according to the pressing force and the fingerprint of the N pressing operations comprises:
- the operation type of the N-th press operation is divided, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing operation in which the pressing force does not exceed the preset threshold belongs to the second operation type;
- the comparing the to-be-verified fingerprint sequence and the reference fingerprint sequence includes:
- the operation sequence is the same as the operation sequence corresponding to the reference fingerprint sequence, and the fingerprint corresponding to the reference fingerprint sequence is the same, it is determined that the fingerprint sequence to be verified and the reference fingerprint sequence are the same.
- the method further includes:
- the step of generating the fingerprint sequence to be verified according to the press force and the fingerprint of the N press operations is triggered.
- a fingerprint verification apparatus comprising:
- the operation obtaining module is configured to acquire N times of pressing operations continuously performed by the finger of the user in the fingerprint collection area, N>1;
- a sequence generating module configured to generate a to-be-verified fingerprint sequence according to the pressing force and the fingerprint of the N pressing operations obtained by the operation obtaining module;
- a sequence comparison module configured to compare the to-be-verified fingerprint sequence and the reference fingerprint sequence generated by the sequence generation module
- the first verification module is configured to determine that the fingerprint verification of the user is successful when the sequence comparison module determines that the fingerprint sequence to be verified is the same as the reference fingerprint sequence.
- sequence generation module includes:
- the first sub-module is configured to divide the operation type of the N-th pressing operation, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing force does not exceed the preset threshold The operation belongs to the second operation type;
- the first generation sub-module is configured to sort the corresponding operation types according to the pressing moments of the N pressing operations to obtain an operation sequence
- a second generation submodule configured to generate the to-be-verified fingerprint sequence according to the operation sequence generated by the first generation submodule and the fingerprint.
- sequence generation module includes:
- the second sub-module is configured to divide the operation type of the N-th pressing operation, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing force does not exceed the preset threshold The operation belongs to the second operation type;
- the third generation sub-module is configured to sort the corresponding operation types according to the pressing moments of the N pressing operations, and record the pressing duration of each pressing operation to obtain an operation sequence;
- a fourth generation submodule configured to generate the to-be-verified fingerprint sequence according to the operation sequence generated by the third generation submodule and the fingerprint.
- sequence comparison module includes:
- a sequence comparison submodule configured to compare whether the operation sequence and the operation sequence corresponding to the reference fingerprint sequence are the same, and compare whether the fingerprint and the fingerprint corresponding to the reference fingerprint sequence are the same;
- a result determining submodule configured to determine, when the sequence comparison submodule determines that the operation sequence is the same as the operation sequence corresponding to the reference fingerprint sequence, and the fingerprint corresponding to the reference fingerprint sequence is the same, determining The fingerprint sequence to be verified and the reference fingerprint sequence are the same.
- the device further includes:
- the number detection module is configured to detect whether the number of presses of the N press operations is the same as the number of presses when the reference fingerprint sequence is generated;
- the second verification module is configured to determine that the fingerprint verification of the user fails when the result of the detection by the number of times detection module is that the number of presses of the N times of pressing operations is different from the number of times of pressing when the reference fingerprint sequence is generated. ;
- a step triggering module configured to: when the number of times the number of presses of the N times of pressing operations is the same as the number of times of presses when the reference fingerprint sequence is generated, the trigger sequence generating module performs the Pressing force and fingerprint generation for N press operations The steps to prove the fingerprint sequence.
- a fingerprint verification apparatus comprising:
- a memory configured to store processor executable instructions
- processor is configured to:
- the number of presses of the N-press operation When the number of presses of the N-press operation is different from the number of presses when the reference fingerprint sequence is generated, it is determined that the fingerprint verification of the user fails, and since it is relatively easy to determine the number of presses, the verification fingerprint that does not match the number of presses may be excluded.
- the problem of waste of resources caused by generating fingerprints to be verified by these fingerprints achieves the effect of saving resources.
- FIG. 1 is a flowchart of a fingerprint verification method according to an exemplary embodiment
- FIG. 2A is a flowchart of a fingerprint verification method according to another exemplary embodiment
- FIG. 2B is a flowchart of another fingerprint verification method according to another exemplary embodiment
- FIG. 3 is a block diagram of a fingerprint verification apparatus according to an exemplary embodiment
- FIG. 4 is a block diagram of a fingerprint verification apparatus according to another exemplary embodiment
- FIG. 5 is a block diagram of an apparatus configured for fingerprint verification, according to an exemplary embodiment.
- FIG. 1 is a flowchart of a fingerprint verification method according to an exemplary embodiment.
- the fingerprint verification method is applied to a terminal. As shown in FIG. 1 , the fingerprint verification method includes the following steps.
- step 101 N pressing operations continuously performed by the user's finger in the fingerprint collection area are acquired, N>1.
- step 102 a fingerprint sequence to be verified is generated according to the pressing force and the fingerprint of the N pressing operations.
- step 103 the fingerprint sequence to be verified and the reference fingerprint sequence are compared.
- step 104 when the fingerprint sequence to be verified is the same as the reference fingerprint sequence, it is determined that the fingerprint verification of the user is successful.
- the fingerprint verification method obtains the finger of the user. N times of pressing operations performed continuously in the fingerprint collection area; generating a to-be-verified fingerprint sequence according to the pressing force and fingerprint of the N pressing operations; comparing the fingerprint sequence to be verified with the reference fingerprint sequence; when the fingerprint sequence to be verified is the same as the reference fingerprint sequence
- the fingerprint sequence to be verified can be obtained by combining the pressing force, and the fingerprint verification to be verified by using the fingerprint sequence to be verified, and the fingerprint of the user is verified when the fingerprint is verified by the static fingerprint image to be verified by the finger.
- the leakage causes the terminal to be unsafe, and the effect of improving the security of the terminal is achieved.
- FIG. 2A is a flowchart of a method for verifying a fingerprint according to another exemplary embodiment.
- the fingerprint verification method is applied to a terminal. As shown in FIG. 2A, the fingerprint verification method includes the following steps.
- step 201 N pressing operations continuously performed by the user's finger in the fingerprint collection area are obtained, N>1.
- the fingerprint collection area is an area where the fingerprint sensor is disposed.
- the fingerprint sensor acquires the fingerprint of the user, and the fingerprint is used as the image to be verified for subsequent verification.
- the finger of the user is statically applied to the fingerprint collection area, and the fingerprint sensor acquires a static image to be verified.
- the static image to be verified is leaked, the other person only needs to input the static image to be verified when verifying, that is, The terminal can be operated arbitrarily, resulting in an insecure terminal.
- the fingerprint is unchangeable, and once the static fingerprint image to be verified is leaked, the user cannot modify it later.
- the terminal can acquire a dynamic fingerprint image to be verified generated by the finger pressing operation performed continuously for a plurality of times, so that even if the static fingerprint image to be verified is leaked, the security of the terminal is not threatened, and the terminal is improved. The security of the terminal.
- the finger is operated from the contact fingerprint collection area to the fingerprint collection area as a single pressing operation, and the terminal can acquire a continuous N pressing operation.
- the terminal may acquire the duration between two adjacent pressing operations. When the duration does not exceed the duration threshold, it is determined that the two pressing operations are continuous; when the duration exceeds the duration threshold, the two pressing is determined. Operation is not continuously.
- step 202 the operation type of the N-press operation is divided, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing operation in which the pressing force does not exceed the preset threshold belongs to the second operation type.
- the terminal reads a preset preset threshold, and compares each pressing force with the preset threshold in turn. When a certain pressing force exceeds the preset threshold, determining that the pressing operation belongs to the first operation type; When the pressing force does not exceed the preset threshold, it is determined that the pressing operation belongs to the second operation type.
- the preset threshold can be set by itself, which is not limited in this embodiment.
- the pressing force is 3, when the preset threshold is 1, when the pressing force exceeds the preset threshold, it is determined that the pressing operation is heavy pressure; when the preset threshold is 4, when the pressing force does not exceed the preset threshold, it is determined.
- This pressing operation is light pressure.
- the unit of the pressing force is the same as the unit of the preset threshold.
- step 203 the corresponding operation types are sorted according to the pressing timing of the N pressing operations, and an operation sequence is obtained.
- the terminal can sort the operation types according to the pressing time from the morning to the late, and obtain the operation sequence.
- the pressing moments from the morning to the night are the pressing operations 1, 2, 3, 4, 5, and 6, respectively, and the types of operations of the six pressing operations are heavy pressing, heavy pressing, light pressing, heavy pressing, and light, respectively.
- Pressing, light pressing the resulting sequence of operations is heavy pressure, heavy pressure, light pressure, heavy pressure, light pressure, light pressure.
- the sequence of operations at this time can be analogized to the Morse code.
- a fingerprint sequence to be verified is generated according to the operation sequence and the fingerprint.
- the fingerprints obtained by the terminal for each pressing operation may be the same or different.
- the application scenario is that the user continuously performs N pressing operations using the same finger; when the fingerprints are different, the application scenario is that the user continuously performs N pressing operations using different fingerprints. Work.
- the fingerprint sequence to be verified may be fingerprint 1, heavy pressure; fingerprint 1, heavy pressure; fingerprint 1, light pressure; fingerprint 1, heavy pressure; fingerprint 1, light pressure; fingerprint 1, light pressure.
- step 205 it is compared whether the operation sequence corresponding to the operation sequence and the reference fingerprint sequence is the same, and whether the fingerprint corresponding to the fingerprint and the reference fingerprint sequence is the same.
- the reference fingerprint sequence refers to the fingerprint sequence set by the owner of the terminal for verification before verification.
- the process of acquiring the reference fingerprint sequence by the terminal is the same as the process of obtaining the fingerprint sequence to be verified.
- the reference fingerprint sequence is determined as follows:
- the terminal After obtaining the fingerprint sequence to be verified and the reference fingerprint sequence, the terminal needs to compare the fingerprint sequence to be verified with the reference fingerprint sequence, and when the fingerprint sequence to be verified is the same as the reference fingerprint sequence, it is determined that the fingerprint verification of the user is successful; When the fingerprint sequence is different from the reference fingerprint sequence, it is determined that the fingerprint verification of the user fails.
- comparing the fingerprint sequence to be verified and the reference fingerprint sequence it may be compared whether the operation sequence corresponding to the operation sequence and the reference fingerprint sequence is the same, and whether the fingerprint corresponding to the fingerprint and the reference fingerprint sequence is the same.
- This embodiment does not limit the sequential execution sequence of the comparison operation sequence and the comparison fingerprint.
- step 206 when the operation sequence corresponding to the operation sequence and the reference fingerprint sequence are the same, and the fingerprint corresponding to the fingerprint and the reference fingerprint sequence are the same, it is determined that the fingerprint sequence to be verified and the reference fingerprint sequence are the same.
- step 207 when the fingerprint sequence to be verified is the same as the reference fingerprint sequence, it is determined that the fingerprint verification of the user is successful.
- the terminal may first exclude the verification fingerprints whose compression times do not match, so that the fingerprint sequence to be verified is not generated for the fingerprints. Therefore, the method provided in this embodiment further includes:
- step 202 is triggered.
- the fingerprint verification failure may be directly determined, and the flow is ended; when the number of presses when the fingerprint sequence to be verified is generated is 5, The fingerprint sequence to be verified is generated again, and the fingerprint sequence to be verified and the reference fingerprint sequence are compared, and whether the verification is successful is determined according to the comparison result.
- the owner of the terminal may reset the reference fingerprint sequence according to the new number of pressing times and the pressing force, the reference fingerprint sequence and the leaked fingerprint to be verified.
- the sequence is different, thus ensuring the security of the terminal.
- steps 202-204 can also be replaced with the following steps:
- step 202' the operation type of the N-press operation is divided, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing operation in which the pressing force does not exceed the preset threshold belongs to the second operation type.
- Step 202' is the same as step 202 and will not be described here.
- step 203' the corresponding operation type is sorted according to the pressing timing of the N pressing operations, and the pressing time of each pressing operation is recorded to obtain an operation sequence.
- the pressing time is from morning to night in the order of pressing operations 1, 2, 3, 4, 5, and 6, respectively.
- the operation types of the six pressing operations are heavy pressure, heavy pressure, light pressure, heavy pressure, and light pressure, respectively.
- light pressure, and the pressing time is 3s, 1s, 2s, 3s, 1s, 3s, respectively, the obtained operation sequence is heavy pressure, 3s; heavy pressure, 1s; light pressure, 2s; heavy pressure, 3s; light pressure, 1s; light pressure, 3s.
- the terminal may also set a time threshold, and divide the pressing operation that exceeds the time threshold into a long press, and the pressing duration does not exceed the time threshold.
- the pressing operation is divided into short presses.
- the time threshold can be set by itself, which is not limited in this embodiment.
- the obtained operation sequence is heavy pressure, long press; heavy pressure, short press; light press, long press; heavy press, long press; light press, short press; light press, long press.
- a fingerprint sequence to be verified is generated based on the sequence of operations and the fingerprint.
- the fingerprints obtained by the terminal for each pressing operation may be the same or different.
- the application scenario is that the user continuously performs N pressing operations using the same finger; when the fingerprints are different, the application scenario is that the user continuously performs N pressing operations using different fingerprints.
- the fingerprint sequence to be verified may be fingerprint 1, heavy pressure, long press; fingerprint 2, heavy pressure, short press; fingerprint 1, light press, long press; fingerprint 1, heavy press, long press; fingerprint 3, light press, short press ; fingerprint 1, light pressure, long press.
- FIG. 2B provides another method for obtaining a fingerprint sequence to be verified
- the terminal obtains The method of taking the reference fingerprint sequence also needs to be changed accordingly, and the process of the terminal acquiring the reference fingerprint sequence is the same as the process of obtaining the fingerprint sequence to be verified.
- the reference fingerprint sequence is determined as follows:
- the fingerprint verification method acquires N times of pressing operations continuously performed by the user's finger in the fingerprint collection area; and generates a to-be-verified fingerprint sequence according to the pressing strength and fingerprint of the N pressing operations;
- the fingerprint sequence to be verified and the reference fingerprint sequence when the fingerprint sequence to be verified is the same as the reference fingerprint sequence, it is determined that the fingerprint verification of the user is successful, and the fingerprint sequence to be verified can be obtained by combining the pressing force, and the fingerprint verification to be verified is used for fingerprint verification, and the solution is solved.
- fingerprint verification is performed using a static fingerprint image to be verified by a finger, if the fingerprint of the user is leaked, the terminal is unsafe, and the security of the terminal is improved.
- the number of presses of the N-press operation When the number of presses of the N-press operation is different from the number of presses when the reference fingerprint sequence is generated, it is determined that the fingerprint verification of the user fails, and since it is relatively easy to determine the number of presses, the verification fingerprint that does not match the number of presses may be excluded.
- the problem of waste of resources caused by generating fingerprints to be verified by these fingerprints achieves the effect of saving resources.
- FIG. 3 is a block diagram of a fingerprint verification apparatus, which is applied to a terminal, as shown in FIG. 3, the fingerprint verification apparatus includes: an operation acquisition module 310, a sequence generation module 320, Sequence comparison module 330 and first verification module 340.
- the operation obtaining module 310 is configured to acquire N pressing operations continuously performed by the finger of the user in the fingerprint collection area, N>1;
- the sequence generating module 320 is configured to generate a to-be-verified fingerprint sequence according to the pressing force and the fingerprint of the N pressing operations obtained by the operation obtaining module 310;
- the sequence comparison module 330 is configured to compare the fingerprint sequence to be verified and the reference fingerprint sequence generated by the sequence generation module 320;
- the first verification module 340 is configured to determine that the fingerprint verification of the user is successful when the sequence comparison module 330 determines that the fingerprint sequence to be verified is the same as the reference fingerprint sequence.
- the fingerprint verification apparatus acquires N times of pressing operations continuously performed by the user's finger in the fingerprint collection area; and generates a to-be-verified fingerprint sequence according to the pressing strength and fingerprint of the N times of pressing operations;
- the fingerprint sequence to be verified and the reference fingerprint sequence when the fingerprint sequence to be verified is the same as the reference fingerprint sequence, it is determined that the fingerprint verification of the user is successful, and the fingerprint sequence to be verified can be obtained by combining the pressing force, and the fingerprint verification to be verified is used for fingerprint verification, and the solution is solved.
- fingerprint verification is performed using a static fingerprint image to be verified by a finger, if the fingerprint of the user is leaked, the terminal is unsafe, and the security of the terminal is improved.
- FIG. 4 is a block diagram of a fingerprint verification apparatus, which is applied to a terminal.
- the fingerprint verification apparatus includes an operation acquisition module 410 and a sequence generation module 420, according to another exemplary embodiment.
- the operation obtaining module 410 is configured to acquire N times of pressing operations continuously performed by the finger of the user in the fingerprint collection area, N>1;
- the sequence generating module 420 is configured to generate a fingerprint sequence to be verified according to the pressing force and fingerprint of the N pressing operations obtained by the operation obtaining module 410;
- the sequence comparison module 430 is configured to compare the fingerprint sequence to be verified and the reference fingerprint sequence generated by the sequence generation module 420;
- the first verification module 440 is configured to determine the fingerprint sequence to be verified when the sequence comparison module 430 determines When the column is the same as the base fingerprint sequence, it is determined that the fingerprint verification of the user is successful.
- the sequence generating module 420 includes: a first dividing submodule 421, a first generating submodule 422, and a second generating submodule 423;
- the first sub-module 421 is configured to divide the operation type of the N-th press operation, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing operation in which the pressing force does not exceed the preset threshold belongs to Second type of operation;
- the first generation sub-module 422 is configured to sort the corresponding operation types according to the pressing moments of the N pressing operations to obtain an operation sequence
- the second generation submodule 423 is configured to generate a fingerprint sequence to be verified according to the operation sequence and the fingerprint generated by the first generation submodule 422.
- the sequence generating module 420 includes: a second dividing submodule 424, a third generating submodule 425, and a fourth generating submodule 426;
- the second sub-module 424 is configured to divide the operation type of the N-th press operation, wherein the pressing operation in which the pressing force exceeds the preset threshold belongs to the first operation type, and the pressing operation in which the pressing force does not exceed the preset threshold belongs to Second type of operation;
- the third generation sub-module 425 is configured to sort the corresponding operation types according to the pressing timing of the N pressing operations, and record the pressing duration of each pressing operation to obtain an operation sequence;
- the fourth generation sub-module 426 is configured to generate a to-be-verified fingerprint sequence according to the operation sequence and the fingerprint generated by the third generation sub-module 425.
- the sequence comparison module 430 includes: a sequence comparison submodule 431 and a result determination submodule 432;
- the sequence comparison sub-module 431 is configured to compare whether the operation sequence corresponding to the operation sequence and the reference fingerprint sequence is the same, and compare whether the fingerprint corresponding to the fingerprint and the reference fingerprint sequence is the same;
- the result determining sub-module 432 is configured to determine, when the sequence comparison sub-module 431 determines that the operation sequence and the reference fingerprint sequence correspond to an operation sequence, and the fingerprint and the reference fingerprint sequence corresponding to the finger When the lines are the same, it is determined that the fingerprint sequence to be verified is the same as the reference fingerprint sequence.
- the apparatus provided in this embodiment further includes: a frequency detection module 450, a second verification module 460, and a step triggering module 470;
- the number-of-times detecting module 450 is configured to detect whether the number of presses of the N-th press operation is the same as the number of presses when the reference fingerprint sequence is generated;
- the second verification module 460 is configured to determine that the verification of the fingerprint of the user fails when the number of times of detection of the N times of pressing operations is different from the number of times of pressing when the reference fingerprint sequence is generated;
- the step triggering module 470 is configured to, when the number of times of pressing the N times of pressing operations detected by the number of times detecting module 450 is the same as the number of times of pressing when generating the reference fingerprint sequence, the trigger sequence generating module 420 performs the pressing according to the N pressing operations.
- the fingerprint verification apparatus acquires N times of pressing operations continuously performed by the user's finger in the fingerprint collection area; and generates a to-be-verified fingerprint sequence according to the pressing strength and fingerprint of the N times of pressing operations;
- the fingerprint sequence to be verified and the reference fingerprint sequence when the fingerprint sequence to be verified is the same as the reference fingerprint sequence, it is determined that the fingerprint verification of the user is successful, and the fingerprint sequence to be verified can be obtained by combining the pressing force, and the fingerprint verification to be verified is used for fingerprint verification, and the solution is solved.
- fingerprint verification is performed using a static fingerprint image to be verified by a finger, if the fingerprint of the user is leaked, the terminal is unsafe, and the security of the terminal is improved.
- the number of presses of the N-press operation When the number of presses of the N-press operation is different from the number of presses when the reference fingerprint sequence is generated, it is determined that the fingerprint verification of the user fails, and since it is relatively easy to determine the number of presses, the verification fingerprint that does not match the number of presses may be excluded.
- the problem of waste of resources caused by generating fingerprints to be verified by these fingerprints achieves the effect of saving resources.
- An exemplary embodiment of the present disclosure provides a fingerprint verification apparatus, which can implement a fingerprint verification method provided by an embodiment of the present disclosure, where the fingerprint verification apparatus includes: a processor, a memory configured to store processor executable instructions;
- processor is configured to:
- FIG. 5 is a block diagram of an apparatus 500 configured for fingerprint verification, according to an exemplary embodiment.
- device 500 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
- apparatus 500 can include one or more of the following components: processing component 502, memory 504, power component 506, multimedia component 508, audio component 510, input/output (I/O) interface 512, sensor component 514, and Communication component 516.
- Processing component 502 typically controls the overall operation of device 500, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 502 can include one or more processors 518 to execute instructions to perform all or part of the steps described above.
- processing component 502 can include one or more modules to facilitate interaction between component 502 and other components.
- processing component 502 can include a multimedia module to facilitate interaction between multimedia component 508 and processing component 502.
- Memory 504 is configured to store various types of data to support operation at device 500. Examples of such data include instructions for any application or method operating on device 500, contact data, phone book data, messages, pictures, videos, and the like. Memory 504 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access Memory (SRAM), EEPROM, EEPROM, Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Fast Flash memory, disk or disc.
- SRAM static random access Memory
- EEPROM Electrically erasable Read Only Memory
- PROM Read Only Memory
- Magnetic Memory Magnetic Memory
- Fast Flash memory disk or disc.
- Power component 506 provides power to various components of device 500.
- Power component 506 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 500.
- the multimedia component 508 includes a screen between the device 500 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 508 includes a front camera and/or a rear camera. When the device 500 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 510 is configured to output and/or input an audio signal.
- audio component 510 includes a microphone (MIC) that is configured to receive an external audio signal when device 500 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 504 or transmitted via communication component 516.
- the audio component 510 also includes a speaker configured to output an audio signal.
- the I/O interface 512 provides an interface between the processing component 502 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 514 includes one or more sensors configured to provide each of device 500 State assessment of aspects.
- sensor assembly 514 can detect an open/closed state of device 500, a relative positioning of components, such as the display and keypad of device 500, and sensor component 514 can also detect a change in position of one component of device 500 or device 500. The presence or absence of user contact with device 500, device 500 orientation or acceleration/deceleration, and temperature variation of device 500.
- Sensor assembly 514 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor component 514 can also include a light sensor, such as a CMOS or CCD image sensor, configured for use in imaging applications.
- the sensor component 514 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- the sensor component 514 can include a fingerprint sensor configured to capture a user's fingerprint.
- Communication component 516 is configured to facilitate wired or wireless communication between device 500 and other devices.
- the device 500 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- communication component 516 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
- the communication component 516 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- apparatus 500 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation configured to perform the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor, or other electronic component implementation configured to perform the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 504 comprising instructions executable by processor 518 of apparatus 500 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, or the like.
- the technical solution provided by the embodiment of the present disclosure obtains the N-press operation continuously performed by the user's finger in the fingerprint collection area; generates the to-be-verified fingerprint sequence according to the pressing force and the fingerprint of the N-press operation; compares the fingerprint sequence to be verified and The reference fingerprint sequence; when the fingerprint sequence to be verified is the same as the reference fingerprint sequence, it is determined that the fingerprint verification of the user is successful, and the fingerprint sequence to be verified can be obtained by combining the pressing force, and the fingerprint sequence to be verified is used for fingerprint verification, thereby solving the static use of the finger.
- the fingerprint image to be verified is subjected to fingerprint verification, if the fingerprint of the user is leaked, the terminal is insecure, and the security of the terminal is improved.
- the number of presses of the N-press operation When the number of presses of the N-press operation is different from the number of presses when the reference fingerprint sequence is generated, it is determined that the fingerprint verification of the user fails, and since it is relatively easy to determine the number of presses, the verification fingerprint that does not match the number of presses may be excluded.
- the problem of waste of resources caused by generating fingerprints to be verified by these fingerprints achieves the effect of saving resources.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Collating Specific Patterns (AREA)
- Image Input (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
一种指纹验证方法及装置,属于计算机技术领域。所述方法包括:获取用户的手指在指纹采集区域内连续执行的N次按压操作(101);根据所述N次按压操作的按压力度和指纹生成待验证指纹序列(102);比较所述待验证指纹序列和基准指纹序列(103);当所述待验证指纹序列与所述基准指纹序列相同时,确定对所述用户的指纹验证成功(104)。通过该指纹验证方法,解决了在利用手指的静态的待验证指纹图像进行指纹验证时,若用户的指纹被泄露,导致终端不安全的问题,达到了提高终端的安全性的效果。
Description
相关申请的交叉引用
本申请基于申请号为201610112807.3、申请日为2016年2月29日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
本公开实施例涉及计算机技术领域,特别涉及一种指纹验证方法及装置。
目前,指纹验证之前,终端提示用户将单个手指放置在指纹传感器上,通过指纹传感器采集该手指的指纹,将该指纹作为基准指纹;在指纹验证过程中,终端采集用户的待匹配指纹;检测该待匹配指纹与基准指纹是否相同;当该待匹配指纹与基准指纹相同时,确定验证成功。
发明内容
为解决相关技术中的问题,本公开实施例提供了一种指纹验证方法及装置。
根据本公开实施例的第一方面,提供一种指纹验证方法,所述方法包括:
获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;
根据所述N次按压操作的按压力度和指纹生成待验证指纹序列;
比较所述待验证指纹序列和基准指纹序列;
当所述待验证指纹序列与所述基准指纹序列相同时,确定对所述用户的指纹验证成功。
可选的,所述根据所述N次按压操作的按压力度和指纹生成待验证指纹序列,包括:
对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过所述预设阈值的按压操作属于第二操作类型;
按照所述N次按压操作的按压时刻对对应的操作类型进行排序,得到操作序列;
根据所述操作序列和所述指纹生成所述待验证指纹序列。
可选的,所述根据所述N次按压操作的按压力度和指纹生成待验证指纹序列,包括:
对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过所述预设阈值的按压操作属于第二操作类型;
按照所述N次按压操作的按压时刻对对应的操作类型进行排序,并记录每次按压操作的按压时长,得到操作序列;
根据所述操作序列和所述指纹生成所述待验证指纹序列。
可选的,所述比较所述待验证指纹序列和基准指纹序列,包括:
比较所述操作序列和所述基准指纹序列对应的操作序列是否相同,以及,比较所述指纹和所述基准指纹序列对应的指纹是否相同;
当所述操作序列和所述基准指纹序列对应的操作序列相同,且,所述指纹和所述基准指纹序列对应的指纹相同时,确定所述待验证指纹序列和所述基准指纹序列相同。
可选的,所述方法还包括:
检测所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数是否相同;
当所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数不同时,确定对所述用户的指纹验证失败;
当所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数相同时,触发执行所述根据所述N次按压操作的按压力度和指纹生成待验证指纹序列的步骤。
根据本公开实施例的第二方面,提供一种指纹验证装置,所述装置包括:
操作获取模块,被配置为获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;
序列生成模块,被配置为根据所述操作获取模块得到的所述N次按压操作的按压力度和指纹生成待验证指纹序列;
序列比较模块,被配置为比较所述序列生成模块生成的所述待验证指纹序列和基准指纹序列;
第一验证模块,被配置为当所述序列比较模块确定所述待验证指纹序列与所述基准指纹序列相同时,确定对所述用户的指纹验证成功。
可选的,所述序列生成模块,包括:
第一划分子模块,被配置为对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过所述预设阈值的按压操作属于第二操作类型;
第一生成子模块,被配置为按照所述N次按压操作的按压时刻对对应的操作类型进行排序,得到操作序列;
第二生成子模块,被配置为根据所述第一生成子模块生成的所述操作序列和所述指纹生成所述待验证指纹序列。
可选的,所述序列生成模块,包括:
第二划分子模块,被配置为对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过所述预设阈值的按压操作属于第二操作类型;
第三生成子模块,被配置为按照所述N次按压操作的按压时刻对对应的操作类型进行排序,并记录每次按压操作的按压时长,得到操作序列;
第四生成子模块,被配置为根据所述第三生成子模块生成的所述操作序列和所述指纹生成所述待验证指纹序列。
可选的,所述序列比较模块,包括:
序列比较子模块,被配置为比较所述操作序列和所述基准指纹序列对应的操作序列是否相同,以及,比较所述指纹和所述基准指纹序列对应的指纹是否相同;
结果确定子模块,被配置为当所述序列比较子模块确定所述操作序列和所述基准指纹序列对应的操作序列相同,且,所述指纹和所述基准指纹序列对应的指纹相同时,确定所述待验证指纹序列和所述基准指纹序列相同。
可选的,所述装置还包括:
次数检测模块,被配置为检测所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数是否相同;
第二验证模块,被配置为当所述次数检测模块检测的结果为所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数不同时,确定对所述用户的指纹验证失败;
步骤触发模块,被配置为当所述次数检测模块检测的结果为所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数相同时,触发序列生成模块执行所述根据所述N次按压操作的按压力度和指纹生成待验
证指纹序列的步骤。
根据本公开实施例的第三方面,提供一种指纹验证装置,所述装置包括:
处理器;
配置为存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;
根据所述N次按压操作的按压力度和指纹生成待验证指纹序列;
比较所述待验证指纹序列和基准指纹序列;
当所述待验证指纹序列与所述基准指纹序列相同时,确定对所述用户的指纹验证成功。
本公开的实施例提供的技术方案可以包括以下有益效果:
通过获取用户的手指在指纹采集区域内连续执行的N次按压操作;根据N次按压操作的按压力度和指纹生成待验证指纹序列;比较待验证指纹序列和基准指纹序列;当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功,可以结合按压力度得到待验证指纹序列,利用待验证指纹序列进行指纹验证,解决了在利用手指的静态的待验证指纹图像进行指纹验证时,若用户的指纹被泄露,导致终端不安全的问题,达到了提高终端的安全性的效果。
通过当N次按压操作的按压次数与生成基准指纹序列时的按压次数不同时,确定对用户的指纹验证失败,由于确定按压次数比较容易,因此,可以先排除按压次数不匹配的验证指纹,解决了对这些指纹生成待验证指纹序列造成资源浪费的问题,达到了节省资源的效果。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性的,并不能限制本公开。
此处的附图被并入说明书中并构成本公开实施例说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是根据一示例性实施例示出的一种指纹验证方法的流程图;
图2A是根据另一示例性实施例示出的一种指纹验证方法的流程图;
图2B是根据另一示例性实施例示出的另一种指纹验证方法的流程图;
图3是根据一示例性实施例示出的一种指纹验证装置的框图;
图4是根据另一示例性实施例示出的一种指纹验证装置的框图;
图5是根据一示例性实施例示出的一种配置为指纹验证的装置的框图。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的一种指纹验证方法的流程图,该指纹验证方法应用于终端中,如图1所示,该指纹验证方法包括以下步骤。
在步骤101中,获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1。
在步骤102中,根据N次按压操作的按压力度和指纹生成待验证指纹序列。
在步骤103中,比较待验证指纹序列和基准指纹序列。
在步骤104中,当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功。
综上所述,本公开实施例提供的指纹验证方法,通过获取用户的手指
在指纹采集区域内连续执行的N次按压操作;根据N次按压操作的按压力度和指纹生成待验证指纹序列;比较待验证指纹序列和基准指纹序列;当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功,可以结合按压力度得到待验证指纹序列,利用待验证指纹序列进行指纹验证,解决了在利用手指的静态的待验证指纹图像进行指纹验证时,若用户的指纹被泄露,导致终端不安全的问题,达到了提高终端的安全性的效果。
图2A是根据另一示例性实施例示出的一种指纹验证方法的流程图,该指纹验证方法应用于终端中,如图2A所示,该指纹验证方法包括如下步骤。
在步骤201中,获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1。
指纹采集区域是设置有指纹传感器的区域,当用户的手指作用于指纹采集区域时,指纹传感器会对用户的指纹进行获取,将该指纹作为待验证指纹图像进行后续验证。
相关技术中,用户的手指静止作用于指纹采集区域,指纹传感器获取静态的待验证指纹图像,当静态的待验证指纹图像被泄露时,他人只要在验证时输入该静态的待验证指纹图像,即可任意操作终端,导致终端不安全。并且,指纹是不可改变的,静态的待验证指纹图像一旦被泄露,后期用户无法修改。
本实施例中,终端可以获取手指在多次连续执行的按压操作而产生的动态的待验证指纹图像,使得即使静态的待验证指纹图像被泄露,也不会对终端的安全性造成威胁,提高了终端的安全性。
本实施例中将手指从接触指纹采集区域到离开指纹采集区域作为一次按压操作,终端可以获取连续的N次按压操作。在实现时,终端可以获取相邻两次按压操作之间的时长,当该时长未超过时长阈值时,确定这两次按压操作是连续的;当该时长超过时长阈值时,确定这两次按压操作不是
连续的。
在步骤202中,对N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过预设阈值的按压操作属于第二操作类型。
终端读取预先设置的预设阈值,依次比较每次的按压力度与该预设阈值,当某一次的按压力度超过该预设阈值时,确定该次按压操作属于第一操作类型;当某一次的按压力度未超过预设阈值时,确定该次按压操作属于第二操作类型。其中,预设阈值可以自行设置,本实施例不作限定。
假设按压力度是3,当预设阈值是1时,按压力度超过预设阈值时,确定本次的按压操作是重压;当预设阈值时4时,按压力度未超过预设阈值时,确定本次的按压操作是轻压。其中,按压力度的单位与预设阈值的单位相同。
在步骤203中,按照N次按压操作的按压时刻对对应的操作类型进行排序,得到操作序列。
由于用户是依次在指纹采集区域内执行按压操作的,因此,每次按压操作的按压时刻不同,终端可以按照按压时刻由早到晚的顺序对操作类型进行排序,得到操作序列。
例如,按压时刻由早到晚的顺序分别是按压操作1、2、3、4、5和6,且这六次按压操作的操作类型分别是重压、重压、轻压、重压、轻压、轻压,则得到的操作序列是重压、重压、轻压、重压、轻压、轻压。此时的操作序列可以类比于摩斯密码。
在步骤204中,根据操作序列和指纹生成待验证指纹序列。
本实施例中,终端对每次按压操作获取到的指纹可以相同,也可以不同。当指纹相同时,应用场景是用户使用同一个手指连续执行N次按压操作;当指纹不同时,应用场景是用户使用不同的指纹连续执行N次按压操
作。
待验证指纹序列可以是指纹1、重压;指纹1、重压;指纹1、轻压;指纹1、重压;指纹1、轻压;指纹1、轻压。
在步骤205中,比较操作序列和基准指纹序列对应的操作序列是否相同,以及,比较指纹和基准指纹序列对应的指纹是否相同。
基准指纹序列是指在验证之前,终端的拥有者设置的用于验证的指纹序列。其中,终端获取基准指纹序列的过程与获取待验证指纹序列的过程相同。
本实施例中,基准指纹序列采用如下方式确定:
1)获取用户的手指在指纹采集区域内连续执行的M次按压操作,M>1;
2)对M次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过预设阈值的按压操作属于第二操作类型;
3)按照M次按压操作的按压时刻对对应的操作类型进行排序,得到操作序列;
4)根据操作序列和指纹生成基准指纹序列。
在得到待验证指纹序列和基准指纹序列后,终端需要将该待验证指纹序列和基准指纹序列进行比较,在待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功;当待验证指纹序列与基准指纹序列不同时,确定对用户的指纹验证失败。
在比较待验证指纹序列和基准指纹序列时,可以比较操作序列和基准指纹序列对应的操作序列是否相同,以及,比较指纹和基准指纹序列对应的指纹是否相同。本实施例不限定比较操作序列和比较指纹的先后执行顺序。
在步骤206中,当操作序列和基准指纹序列对应的操作序列相同,且,指纹和基准指纹序列对应的指纹相同时,确定待验证指纹序列和基准指纹序列相同。
在步骤207中,当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功。
由于指纹验证是否成功与按压次数有关,当按压次数不匹配时,指纹验证必然失败;当按压次数匹配时,指纹验证才有可能成功。并且,由于生成动态的待验证指纹序列需要消耗较多资源,因此,为了节省资源,终端可以先排除按压次数不匹配的验证指纹,从而不对这些指纹生成待验证指纹序列。因此,本实施例提供的方法还包括:
1)检测N次按压操作的按压次数与生成基准指纹序列时的按压次数是否相同;
2)当N次按压操作的按压次数与生成基准指纹序列时的按压次数不同时,确定对用户的指纹验证失败;
3)当N次按压操作的按压次数与生成基准指纹序列时的按压次数相同时,触发执行步骤202。
例如,当生成基准指纹序列时的按压次数是5,生成待验证指纹序列的按压次数是4时,可以直接确定指纹验证失败,结束流程;当生成待验证指纹序列时的按压次数是5时,再生成待验证指纹序列,比较待验证指纹序列和基准指纹序列,根据比较结果确定是否验证成功。
需要说明的是,本实施例中,在动态的待验证指纹序列被泄露时,终端的拥有者可以根据新的按压次数和按压力度重新设置基准指纹序列,该基准指纹序列与泄露的待验证指纹序列不同,从而保证了终端的安全性。
请参考图2B所示的另一种指纹验证方法的流程图,其中,步骤202-204还可以替换成以下步骤:
在步骤202’中,对N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过预设阈值的按压操作属于第二操作类型。
步骤202’和步骤202相同,此处不作赘述。
在步骤203’中,按照N次按压操作的按压时刻对对应的操作类型进行排序,并记录每次按压操作的按压时长,得到操作序列。
例如,按压时刻由早到晚的顺序分别是按压操作1、2、3、4、5和6,这六次按压操作的操作类型分别是重压、重压、轻压、重压、轻压、轻压,且按压时长分别为3s、1s、2s、3s、1s、3s,则得到的操作序列是重压、3s;重压、1s;轻压、2s;重压、3s;轻压、1s;轻压、3s。
可选的,由于用户对时长的把握可能不准确,导致指纹验证失败,终端还可以设置时间阈值,将按压时长超过该时间阈值的按压操作划分为长按,将按压时长未超过该时间阈值的按压操作划分为短按。其中,时间阈值可以自行设置,本实施例不作限定。
例如,时间阈值是1s,则得到的操作序列是重压、长按;重压、短按;轻压、长按;重压、长按;轻压、短按;轻压、长按。
在步骤204’中,根据操作序列和指纹生成待验证指纹序列。
本实施例中,终端对每次按压操作获取到的指纹可以相同,也可以不同。当指纹相同时,应用场景是用户使用同一个手指连续执行N次按压操作;当指纹不同时,应用场景是用户使用不同的指纹连续执行N次按压操作。
待验证指纹序列可以是指纹1、重压、长按;指纹2、重压、短按;指纹1、轻压、长按;指纹1、重压、长按;指纹3、轻压、短按;指纹1、轻压、长按。
由于图2B提供了另外一种获取待验证指纹序列的方法,因此,终端获
取基准指纹序列的方法也需要相应变化,且终端获取基准指纹序列的过程与获取待验证指纹序列的过程相同。
本实施例中,基准指纹序列采用如下方式确定:
1)获取用户的手指在指纹采集区域内连续执行的M次按压操作,M>1;
2)对M次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过预设阈值的按压操作属于第二操作类型;
3)按照M次按压操作的按压时刻对对应的操作类型进行排序,并记录每次按压操作的按压时长,得到操作序列;
4)根据操作序列和指纹生成待验证指纹序列。
综上所述,本公开实施例提供的指纹验证方法,通过获取用户的手指在指纹采集区域内连续执行的N次按压操作;根据N次按压操作的按压力度和指纹生成待验证指纹序列;比较待验证指纹序列和基准指纹序列;当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功,可以结合按压力度得到待验证指纹序列,利用待验证指纹序列进行指纹验证,解决了在利用手指的静态的待验证指纹图像进行指纹验证时,若用户的指纹被泄露,导致终端不安全的问题,达到了提高终端的安全性的效果。
通过当N次按压操作的按压次数与生成基准指纹序列时的按压次数不同时,确定对用户的指纹验证失败,由于确定按压次数比较容易,因此,可以先排除按压次数不匹配的验证指纹,解决了对这些指纹生成待验证指纹序列造成资源浪费的问题,达到了节省资源的效果。
图3是根据一示例性实施例示出的一种指纹验证装置的框图,该指纹验证装置应用于终端中,如图3所示,该指纹验证装置包括:操作获取模块310、序列生成模块320、序列比较模块330和第一验证模块340。
该操作获取模块310,被配置为获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;
该序列生成模块320,被配置为根据操作获取模块310得到的N次按压操作的按压力度和指纹生成待验证指纹序列;
该序列比较模块330,被配置为比较序列生成模块320生成的待验证指纹序列和基准指纹序列;
该第一验证模块340,被配置为当序列比较模块330确定待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功。
综上所述,本公开实施例提供的指纹验证装置,通过获取用户的手指在指纹采集区域内连续执行的N次按压操作;根据N次按压操作的按压力度和指纹生成待验证指纹序列;比较待验证指纹序列和基准指纹序列;当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功,可以结合按压力度得到待验证指纹序列,利用待验证指纹序列进行指纹验证,解决了在利用手指的静态的待验证指纹图像进行指纹验证时,若用户的指纹被泄露,导致终端不安全的问题,达到了提高终端的安全性的效果。
图4是根据另一示例性实施例示出的一种指纹验证装置的框图,该指纹验证装置应用于终端中,如图4所示,该指纹验证装置包括:操作获取模块410、序列生成模块420、序列比较模块430和第一验证模块440。
该操作获取模块410,被配置为获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;
该序列生成模块420,被配置为根据操作获取模块410得到的N次按压操作的按压力度和指纹生成待验证指纹序列;
该序列比较模块430,被配置为比较序列生成模块420生成的待验证指纹序列和基准指纹序列;
该第一验证模块440,被配置为当序列比较模块430确定待验证指纹序
列与基准指纹序列相同时,确定对用户的指纹验证成功。
可选的,序列生成模块420,包括:第一划分子模块421、第一生成子模块422和第二生成子模块423;
该第一划分子模块421,被配置为对N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过预设阈值的按压操作属于第二操作类型;
该第一生成子模块422,被配置为按照N次按压操作的按压时刻对对应的操作类型进行排序,得到操作序列;
该第二生成子模块423,被配置为根据第一生成子模块422生成的操作序列和指纹生成待验证指纹序列。
可选的,序列生成模块420,包括:第二划分子模块424、第三生成子模块425和第四生成子模块426;
该第二划分子模块424,被配置为对N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过预设阈值的按压操作属于第二操作类型;
该第三生成子模块425,被配置为按照N次按压操作的按压时刻对对应的操作类型进行排序,并记录每次按压操作的按压时长,得到操作序列;
该第四生成子模块426,被配置为根据第三生成子模块425生成的操作序列和指纹生成待验证指纹序列。
可选的,序列比较模块430,包括:序列比较子模块431和结果确定子模块432;
该序列比较子模块431,被配置为比较操作序列和基准指纹序列对应的操作序列是否相同,以及,比较指纹和基准指纹序列对应的指纹是否相同;
该结果确定子模块432,被配置为当序列比较子模块431确定操作序列和基准指纹序列对应的操作序列相同,且,指纹和基准指纹序列对应的指
纹相同时,确定待验证指纹序列和基准指纹序列相同。
可选的,本实施例提供的装置还包括:次数检测模块450、第二验证模块460和步骤触发模块470;
该次数检测模块450,被配置为检测N次按压操作的按压次数与生成基准指纹序列时的按压次数是否相同;
该第二验证模块460,被配置为当次数检测模块450检测的结果为N次按压操作的按压次数与生成基准指纹序列时的按压次数不同时,确定对用户的指纹验证失败;
该步骤触发模块470,被配置为当次数检测模块450检测的结果为N次按压操作的按压次数与生成基准指纹序列时的按压次数相同时,触发序列生成模块420执行根据N次按压操作的按压力度和指纹生成待验证指纹序列的步骤。
综上所述,本公开实施例提供的指纹验证装置,通过获取用户的手指在指纹采集区域内连续执行的N次按压操作;根据N次按压操作的按压力度和指纹生成待验证指纹序列;比较待验证指纹序列和基准指纹序列;当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功,可以结合按压力度得到待验证指纹序列,利用待验证指纹序列进行指纹验证,解决了在利用手指的静态的待验证指纹图像进行指纹验证时,若用户的指纹被泄露,导致终端不安全的问题,达到了提高终端的安全性的效果。
通过当N次按压操作的按压次数与生成基准指纹序列时的按压次数不同时,确定对用户的指纹验证失败,由于确定按压次数比较容易,因此,可以先排除按压次数不匹配的验证指纹,解决了对这些指纹生成待验证指纹序列造成资源浪费的问题,达到了节省资源的效果。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
本公开实施例一示例性实施例提供了一种指纹验证装置,能够实现本公开实施例提供的指纹验证方法,该指纹验证装置包括:处理器、配置为存储处理器可执行指令的存储器;
其中,处理器被配置为:
获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;
根据N次按压操作的按压力度和指纹生成待验证指纹序列;
比较待验证指纹序列和基准指纹序列;
当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功。
图5是根据一示例性实施例示出的一种配置为指纹验证的装置500的框图。例如,装置500可以是移动电话、计算机、数字广播终端、消息收发设备、游戏控制台、平板设备、医疗设备、健身设备、个人数字助理等。
参照图5,装置500可以包括以下一个或多个组件:处理组件502,存储器504,电源组件506,多媒体组件508,音频组件510,输入/输出(I/O)接口512,传感器组件514,以及通信组件516。
处理组件502通常控制装置500的整体操作,诸如与显示、电话呼叫、数据通信、相机操作和记录操作相关联的操作。处理组件502可以包括一个或多个处理器518来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件502可以包括一个或多个模块,便于处理组件502和其他组件之间的交互。例如,处理组件502可以包括多媒体模块,以方便多媒体组件508和处理组件502之间的交互。
存储器504被配置为存储各种类型的数据以支持在装置500的操作。这些数据的示例包括用于在装置500上操作的任何应用程序或方法的指令、联系人数据、电话簿数据、消息、图片、视频等。存储器504可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取
存储器(SRAM)、电可擦除可编程只读存储器(EEPROM)、可擦除可编程只读存储器(EPROM)、可编程只读存储器(PROM)、只读存储器(ROM)、磁存储器、快闪存储器、磁盘或光盘。
电源组件506为装置500的各种组件提供电力。电源组件506可以包括电源管理系统,一个或多个电源,及其他与为装置500生成、管理和分配电力相关联的组件。
多媒体组件508包括在所述装置500和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件508包括一个前置摄像头和/或后置摄像头。当装置500处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件510被配置为输出和/或输入音频信号。例如,音频组件510包括一个麦克风(MIC),当装置500处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器504或经由通信组件516发送。在一些实施例中,音频组件510还包括一个扬声器,配置为输出音频信号。
I/O接口512为处理组件502和外围接口模块之间提供接口,上述外围接口模块可以是键盘、点击轮、按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件514包括一个或多个传感器,配置为为装置500提供各个
方面的状态评估。例如,传感器组件514可以检测到装置500的打开/关闭状态,组件的相对定位,例如所述组件为装置500的显示器和小键盘,传感器组件514还可以检测装置500或装置500一个组件的位置改变,用户与装置500接触的存在或不存在,装置500方位或加速/减速和装置500的温度变化。传感器组件514可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件514还可以包括光传感器,如CMOS或CCD图像传感器,配置为在成像应用中使用。在一些实施例中,该传感器组件514还可以包括加速度传感器、陀螺仪传感器、磁传感器、压力传感器或温度传感器。该传感器组件514可以包括指纹传感器,被配置用来采集用户的指纹。
通信组件516被配置为便于装置500和其他设备之间有线或无线方式的通信。装置500可以接入基于通信标准的无线网络,如WiFi、2G或3G、或它们的组合。在一个示例性实施例中,通信组件516经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件516还包括近场通信(NFC)模块,以促进短程通信。例如,NFC模块可基于射频识别(RFID)技术、红外数据协会(IrDA)技术、超宽带(UWB)技术、蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置500可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,配置为执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器504,上述指令可由装置500的处理器518执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、CD-ROM、磁带、软盘和光数据存储设备等。
本领域技术人员在考虑说明书及实践这里的公开后,将容易想到本公开实施例的其它实施方案。本申请旨在涵盖本公开实施例的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开实施例的一般性原理并包括本公开实施例未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开实施例的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开实施例并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。
本公开的实施例提供的技术方案,通过获取用户的手指在指纹采集区域内连续执行的N次按压操作;根据N次按压操作的按压力度和指纹生成待验证指纹序列;比较待验证指纹序列和基准指纹序列;当待验证指纹序列与基准指纹序列相同时,确定对用户的指纹验证成功,可以结合按压力度得到待验证指纹序列,利用待验证指纹序列进行指纹验证,解决了在利用手指的静态的待验证指纹图像进行指纹验证时,若用户的指纹被泄露,导致终端不安全的问题,达到了提高终端的安全性的效果。
通过当N次按压操作的按压次数与生成基准指纹序列时的按压次数不同时,确定对用户的指纹验证失败,由于确定按压次数比较容易,因此,可以先排除按压次数不匹配的验证指纹,解决了对这些指纹生成待验证指纹序列造成资源浪费的问题,达到了节省资源的效果。
Claims (11)
- 一种指纹验证方法,包括:获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;根据所述N次按压操作的按压力度和指纹生成待验证指纹序列;比较所述待验证指纹序列和基准指纹序列;当所述待验证指纹序列与所述基准指纹序列相同时,确定对所述用户的指纹验证成功。
- 根据权利要求1所述的方法,其中,所述根据所述N次按压操作的按压力度和指纹生成待验证指纹序列,包括:对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过所述预设阈值的按压操作属于第二操作类型;按照所述N次按压操作的按压时刻对对应的操作类型进行排序,得到操作序列;根据所述操作序列和所述指纹生成所述待验证指纹序列。
- 根据权利要求1所述的方法,其中,所述根据所述N次按压操作的按压力度和指纹生成待验证指纹序列,包括:对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过所述预设阈值的按压操作属于第二操作类型;按照所述N次按压操作的按压时刻对对应的操作类型进行排序,并记录每次按压操作的按压时长,得到操作序列;根据所述操作序列和所述指纹生成所述待验证指纹序列。
- 根据权利要求2或3所述的方法,其中,所述比较所述待验证指纹序列和基准指纹序列,包括:比较所述操作序列和所述基准指纹序列对应的操作序列是否相同,以及,比较所述指纹和所述基准指纹序列对应的指纹是否相同;当所述操作序列和所述基准指纹序列对应的操作序列相同,且,所述指纹和所述基准指纹序列对应的指纹相同时,确定所述待验证指纹序列和所述基准指纹序列相同。
- 根据权利要求1至4任一所述的方法,其中,所述方法还包括:检测所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数是否相同;当所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数不同时,确定对所述用户的指纹验证失败;当所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数相同时,触发执行所述根据所述N次按压操作的按压力度和指纹生成待验证指纹序列的步骤。
- 一种指纹验证装置,包括:操作获取模块,被配置为获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;序列生成模块,被配置为根据所述操作获取模块得到的所述N次按压操作的按压力度和指纹生成待验证指纹序列;序列比较模块,被配置为比较所述序列生成模块生成的所述待验证指纹序列和基准指纹序列;第一验证模块,被配置为当所述序列比较模块确定所述待验证指纹序列与所述基准指纹序列相同时,确定对所述用户的指纹验证成功。
- 根据权利要求6所述的装置,其中,所述序列生成模块,包括:第一划分子模块,被配置为对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压 力度未超过所述预设阈值的按压操作属于第二操作类型;第一生成子模块,被配置为按照所述N次按压操作的按压时刻对对应的操作类型进行排序,得到操作序列;第二生成子模块,被配置为根据所述第一生成子模块生成的所述操作序列和所述指纹生成所述待验证指纹序列。
- 根据权利要求6所述的装置,其中,所述序列生成模块,包括:第二划分子模块,被配置为对所述N次按压操作的操作类型进行划分,其中,按压力度超过预设阈值的按压操作属于第一操作类型,按压力度未超过所述预设阈值的按压操作属于第二操作类型;第三生成子模块,被配置为按照所述N次按压操作的按压时刻对对应的操作类型进行排序,并记录每次按压操作的按压时长,得到操作序列;第四生成子模块,被配置为根据所述第三生成子模块生成的所述操作序列和所述指纹生成所述待验证指纹序列。
- 根据权利要求7或8所述的装置,其中,所述序列比较模块,包括:序列比较子模块,被配置为比较所述操作序列和所述基准指纹序列对应的操作序列是否相同,以及,比较所述指纹和所述基准指纹序列对应的指纹是否相同;结果确定子模块,被配置为当所述序列比较子模块确定所述操作序列和所述基准指纹序列对应的操作序列相同,且,所述指纹和所述基准指纹序列对应的指纹相同时,确定所述待验证指纹序列和所述基准指纹序列相同。
- 根据权利要求6至9任一所述的装置,其中,所述装置还包括:次数检测模块,被配置为检测所述N次按压操作的按压次数与生成 所述基准指纹序列时的按压次数是否相同;第二验证模块,被配置为当所述次数检测模块检测的结果为所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数不同时,确定对所述用户的指纹验证失败;步骤触发模块,被配置为当所述次数检测模块检测的结果为所述N次按压操作的按压次数与生成所述基准指纹序列时的按压次数相同时,触发所述序列生成模块执行所述根据所述N次按压操作的按压力度和指纹生成待验证指纹序列的步骤。
- 一种指纹验证装置,包括:处理器;配置为存储处理器可执行指令的存储器;其中,所述处理器被配置为:获取用户的手指在指纹采集区域内连续执行的N次按压操作,N>1;根据所述N次按压操作的按压力度和指纹生成待验证指纹序列;比较所述待验证指纹序列和基准指纹序列;当所述待验证指纹序列与所述基准指纹序列相同时,确定对所述用户的指纹验证成功。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610112807.3 | 2016-02-29 | ||
CN201610112807.3A CN107133550B (zh) | 2016-02-29 | 2016-02-29 | 指纹验证方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017148154A1 true WO2017148154A1 (zh) | 2017-09-08 |
Family
ID=57914697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/101861 WO2017148154A1 (zh) | 2016-02-29 | 2016-10-12 | 指纹验证方法及装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US10133911B2 (zh) |
EP (1) | EP3211556A1 (zh) |
CN (1) | CN107133550B (zh) |
WO (1) | WO2017148154A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108022354A (zh) * | 2018-01-18 | 2018-05-11 | 北京创美时代办公家具有限公司 | 一种用于保密柜的指纹验证方法及其验证系统 |
CN108763899A (zh) * | 2018-05-23 | 2018-11-06 | 温州伊诺韦特科技有限公司 | 一种指纹验证启动方法 |
CN110414440B (zh) * | 2019-07-30 | 2022-02-25 | 中国工商银行股份有限公司 | 一种指纹采集识别方法及装置 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100220900A1 (en) * | 2009-03-02 | 2010-09-02 | Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. | Fingerprint sensing device |
US20150161837A1 (en) * | 2013-12-08 | 2015-06-11 | John Stephen Smith | Methods and systems for providing control of a device using a fingerprint sensor |
CN104751038A (zh) * | 2013-12-25 | 2015-07-01 | 腾讯科技(深圳)有限公司 | 一种身份认证方法及装置、系统 |
CN105069343A (zh) * | 2015-08-26 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | 指纹验证方法、指纹验证装置和终端 |
CN105117630A (zh) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | 指纹验证方法、指纹验证装置和终端 |
CN105160315A (zh) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | 一种指纹验证方法、装置及终端 |
CN105160227A (zh) * | 2015-08-28 | 2015-12-16 | 广东欧珀移动通信有限公司 | 远程指纹验证方法和用户终端及指纹验证系统 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5828773A (en) * | 1996-01-26 | 1998-10-27 | Harris Corporation | Fingerprint sensing method with finger position indication |
US6072895A (en) * | 1996-12-13 | 2000-06-06 | International Business Machines Corporation | System and method using minutiae pruning for fingerprint image processing |
US6182892B1 (en) * | 1998-03-25 | 2001-02-06 | Compaq Computer Corporation | Smart card with fingerprint image pass-through |
US6509847B1 (en) * | 1999-09-01 | 2003-01-21 | Gateway, Inc. | Pressure password input device and method |
JP3559754B2 (ja) * | 2000-07-25 | 2004-09-02 | Necエレクトロニクス株式会社 | 指紋認証装置 |
US6895104B2 (en) * | 2001-02-16 | 2005-05-17 | Sac Technologies, Inc. | Image identification system |
JP2003050993A (ja) * | 2001-08-06 | 2003-02-21 | Omron Corp | 指紋読取方法および指紋読取装置 |
JP2003075135A (ja) * | 2001-08-31 | 2003-03-12 | Nec Corp | 指紋画像入力装置および指紋画像による生体識別方法 |
US7119467B2 (en) * | 2003-03-21 | 2006-10-10 | Pratt & Whitney Canada Corp. | Current limiting means for a generator |
US7515252B2 (en) * | 2005-12-30 | 2009-04-07 | Cardinal Health 303, Inc. | Optical fingerprint imaging system and method with protective film |
US8873814B2 (en) * | 2011-11-18 | 2014-10-28 | Ca, Inc. | System and method for using fingerprint sequences for secured identity verification |
-
2016
- 2016-02-29 CN CN201610112807.3A patent/CN107133550B/zh active Active
- 2016-10-12 WO PCT/CN2016/101861 patent/WO2017148154A1/zh active Application Filing
-
2017
- 2017-01-16 EP EP17151623.0A patent/EP3211556A1/en not_active Withdrawn
- 2017-02-28 US US15/444,638 patent/US10133911B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100220900A1 (en) * | 2009-03-02 | 2010-09-02 | Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. | Fingerprint sensing device |
US20150161837A1 (en) * | 2013-12-08 | 2015-06-11 | John Stephen Smith | Methods and systems for providing control of a device using a fingerprint sensor |
CN104751038A (zh) * | 2013-12-25 | 2015-07-01 | 腾讯科技(深圳)有限公司 | 一种身份认证方法及装置、系统 |
CN105117630A (zh) * | 2015-08-21 | 2015-12-02 | 宇龙计算机通信科技(深圳)有限公司 | 指纹验证方法、指纹验证装置和终端 |
CN105069343A (zh) * | 2015-08-26 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | 指纹验证方法、指纹验证装置和终端 |
CN105160227A (zh) * | 2015-08-28 | 2015-12-16 | 广东欧珀移动通信有限公司 | 远程指纹验证方法和用户终端及指纹验证系统 |
CN105160315A (zh) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | 一种指纹验证方法、装置及终端 |
Also Published As
Publication number | Publication date |
---|---|
CN107133550A (zh) | 2017-09-05 |
US20170249497A1 (en) | 2017-08-31 |
US10133911B2 (en) | 2018-11-20 |
CN107133550B (zh) | 2019-12-03 |
EP3211556A1 (en) | 2017-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016107030A1 (zh) | 通知信息显示方法及装置 | |
WO2017088579A1 (zh) | 指纹识别方法及装置 | |
EP3089065B1 (en) | Method and device for permission management | |
WO2017177597A1 (zh) | 实体按键组件、终端、触控响应方法及装置 | |
CN105224195B (zh) | 终端操作方法和装置 | |
WO2017031888A1 (zh) | 指纹识别方法及装置 | |
CN104991789B (zh) | 应用程序开启方法和装置 | |
WO2017059638A1 (zh) | 指纹识别方法及装置 | |
WO2017219269A1 (zh) | 虚拟卡片激活方法及装置 | |
WO2017128767A1 (zh) | 指纹模板录入方法及装置 | |
WO2018133387A1 (zh) | 指纹识别方法及装置 | |
KR101835364B1 (ko) | 터치버튼과 지문인식을 실현하는 장치, 방법, 단말기기, 프로그램 및 기록매체 | |
WO2018098865A1 (zh) | 消息阅读方法及装置 | |
US10824891B2 (en) | Recognizing biological feature | |
WO2017107421A1 (zh) | 支付方法和装置 | |
US20140283013A1 (en) | Method and apparatus for unlocking a feature user portable wireless electronic communication device feature unlock | |
WO2017113930A1 (zh) | 指纹识别方法及装置 | |
US10706307B2 (en) | Methods and devices for processing fingerprint information | |
WO2017140109A1 (zh) | 压力检测方法和装置 | |
WO2017088259A1 (zh) | 屏幕保护方法及装置 | |
WO2017140108A1 (zh) | 压力检测方法和装置 | |
WO2016110146A1 (zh) | 移动终端及虚拟按键的处理方法 | |
CN104391712A (zh) | 关机方法和装置 | |
WO2017148154A1 (zh) | 指纹验证方法及装置 | |
WO2017148138A1 (zh) | 指纹验证方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16892335 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16892335 Country of ref document: EP Kind code of ref document: A1 |