WO2018165942A1 - Dispositif terminal et procédé de reconnaissance d'empreintes digitales - Google Patents
Dispositif terminal et procédé de reconnaissance d'empreintes digitales Download PDFInfo
- Publication number
- WO2018165942A1 WO2018165942A1 PCT/CN2017/076950 CN2017076950W WO2018165942A1 WO 2018165942 A1 WO2018165942 A1 WO 2018165942A1 CN 2017076950 W CN2017076950 W CN 2017076950W WO 2018165942 A1 WO2018165942 A1 WO 2018165942A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- fingerprint sensor
- fingerprint
- terminal device
- state
- sensor
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/0202—Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
- H04M1/026—Details of the structure or mounting of specific components
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
Definitions
- the present application relates to the field of electronic devices and, more particularly, to a terminal device and a method of identifying a fingerprint.
- the on-screen fingerprint sensor can be built into the screen of the mobile phone and does not have to be installed in a specific location, such as the back of the phone or the HOME button position of the phone. Therefore, it is not necessary to stick to a specific size, so that in the fingerprint recognition process, the length of the password is increased, and the security of fingerprint recognition is improved.
- the mobile phone needs to be unlocked, it is necessary to display a specific icon in the position of the fingerprint sensor in the screen to guide the user to press the finger, thereby increasing the power consumption of the mobile phone.
- the in-screen fingerprint technology needs to work in conjunction with the display module and the touch module of the mobile phone, the speed of fingerprint recognition verification is not as good as that of the conventional fingerprint sensor, and therefore, the user experience is poor.
- the embodiment of the present invention provides a terminal device and a method for recognizing a fingerprint, which can balance the security of the fingerprint identification and the user experience.
- a first aspect provides a terminal device, including: a first fingerprint sensor, a second fingerprint sensor, and a processor; the first fingerprint sensor is built in a screen of the terminal device, and the second fingerprint sensor is located at the a location other than the screen in the terminal device; the processor, configured to control an operation mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device.
- the processor is specifically configured to: when the terminal device is in a standby state, control the first fingerprint sensor to be in an inoperative state, and the second fingerprint sensor is in an active state; Or in the case that the terminal device is in a working state and receives a user's access request for an application or a file, according to a security level of the application or file, a relationship with a preset security level threshold, the first is controlled.
- a working mode of the fingerprint sensor and the second fingerprint sensor or when the terminal device is in an active state and does not receive a user-to-application or Controlling, by the access request of the file, that the first fingerprint sensor and the second fingerprint sensor are in an inoperative state; or in the case that the terminal device is in a shutdown state, controlling the first fingerprint sensor and the The second fingerprint sensor is in an inoperative state.
- the processor is specifically configured to: the processor is specifically configured to:
- the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an inactive state.
- the processor is specifically configured to: when the terminal device is in a standby state, control the first fingerprint sensor to be in an inoperative state, and the second fingerprint sensor is in an active state; Or if the terminal device is in an active state, and receives a user's access request for an application or a file, controlling the first fingerprint sensor to be in an active state, and the second fingerprint sensor is in an inoperative state; or Controlling that the first fingerprint sensor and the second fingerprint sensor are in an inoperative state when the terminal device is in an active state and does not receive the user's access request for the application or the file; or the terminal device is in the working state; In the case of the shutdown state, both the first fingerprint sensor and the second fingerprint sensor are controlled to be in an inoperative state.
- the processor is further configured to: acquire, by using the second fingerprint sensor, the user that the first fingerprint sensor is in an inactive state and the second fingerprint sensor is in an active state.
- Fingerprint information fingerprinting the fingerprint information; or obtaining the fingerprint of the user through the first fingerprint sensor if the first fingerprint sensor is in an active state and the second fingerprint sensor is in an inoperative state
- Information performing fingerprint identification on the fingerprint information; or acquiring a fingerprint of the user by using the first fingerprint sensor and the second fingerprint sensor when both the first fingerprint sensor and the second fingerprint sensor are in an active state;
- Information fingerprinting the fingerprint information.
- the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
- the first fingerprint sensor is more secure than the second fingerprint sensor.
- the second fingerprint sensor and the first fingerprint sensor In the same plane or in different planes.
- a second aspect provides a method for identifying a fingerprint, including: controlling an operation mode of a first fingerprint sensor and a second fingerprint sensor according to a state of the terminal device, wherein the first fingerprint sensor is built in the terminal device In the screen, the second fingerprint sensor is located at a position other than the screen in the terminal device; and fingerprint recognition is performed according to an operation mode of the first fingerprint sensor and the second fingerprint sensor.
- the controlling the working mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device including: controlling, when the terminal device is in a standby state, a fingerprint sensor is in an inoperative state, the second fingerprint sensor is in an active state; or in the case that the terminal device is in a working state and receives a user's access request for an application or a file, according to the application or file a security level, a relationship with a preset security level threshold, controlling an operation mode of the first fingerprint sensor and the second fingerprint sensor; or when the terminal device is in an active state, and not receiving a user-to-application or file Controlling the first fingerprint sensor and the second fingerprint sensor to be in an inoperative state in the case of an access request; or controlling the first fingerprint sensor and the The second fingerprint sensor is in an inoperative state.
- the controlling a working mode of the first fingerprint sensor and the second fingerprint sensor according to a security level of the application or a file, and a preset security level threshold including: Controlling whether the first fingerprint sensor and the second fingerprint sensor are in a working state when the security level of the application or file reaches the preset security level threshold; or in the security of the application or file If the level does not reach the preset security level threshold, the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an inactive state.
- the controlling the working mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device, including: controlling, when the terminal device is in a standby state, a fingerprint sensor is in an inoperative state, the second fingerprint sensor is in an active state; or the first fingerprint sensor is controlled if the terminal device is in an active state and receives a user access request for an application or a file
- the second fingerprint sensor is in an inoperative state; or in the case that the terminal device is in an active state, and the user does not receive an access request for an application or a file, the first fingerprint sensor and the device are controlled.
- the second fingerprint sensor is in an inoperative state; or the terminal device is in a shutdown state. In the case, the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
- performing fingerprint identification according to an operation mode of the first fingerprint sensor and the second fingerprint sensor including: when the first fingerprint sensor is in an inactive state, the second When the fingerprint sensor is in the working state, the fingerprint information of the user is acquired by the second fingerprint sensor, and the fingerprint information is fingerprint-finished; or when the first fingerprint sensor is in an active state, the second fingerprint sensor is in a working state.
- the inactive state the fingerprint information of the user is acquired by the first fingerprint sensor, and the fingerprint information is fingerprinted; or when both the first fingerprint sensor and the second fingerprint sensor are in a working state, The fingerprint information of the user is obtained by the first fingerprint sensor and the second fingerprint sensor, and the fingerprint information is fingerprint-recognized.
- the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
- the first fingerprint sensor is more secure than the second fingerprint sensor.
- the second fingerprint sensor and the first fingerprint sensor are in the same plane or different planes.
- a third aspect provides a terminal device including a memory for storing a program, the processor for executing a program, and when the program is executed, the processor is configured to perform the second aspect Methods.
- a computer readable medium storing program code for execution by a terminal device, the program code comprising instructions for performing the method of the second aspect.
- FIG. 1 is a schematic block diagram of a terminal device according to an embodiment of the present application.
- FIG. 2 is a schematic flowchart of a method for identifying a fingerprint according to an embodiment of the present application.
- Figure 3 is a schematic diagram of the mobile phone in a standby state.
- FIG. 4 is a schematic diagram of a screen-out wake-up or a bright-screen unlock by a second fingerprint sensor.
- FIG. 5 is a schematic diagram of payment type fingerprint verification by a first fingerprint sensor.
- FIG. 1 is a schematic block diagram of a terminal device 100 according to an embodiment of the present application. As shown in FIG. 1 , the terminal device 100 may include:
- a first fingerprint sensor 110 a second fingerprint sensor 120, and a processor 130;
- the first fingerprint sensor 110 is built in a screen of the terminal device 100, and the second fingerprint sensor 120 is located at a position other than the screen in the terminal device;
- the processor 130 is configured to control an operating mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device.
- the first fingerprint sensor 110 is built in the screen of the terminal device, and the effective detection range of the first fingerprint sensor 110 may be the same as the screen size of the terminal device, that is, the entire screen.
- the valid display area can be fingerprinted.
- the first fingerprint sensor 110 can also be installed at a specific location in the screen, so that when the fingerprint is verified, the user needs to touch the specific location. In this case, the fingerprint verification can be performed.
- a guide icon for indicating the installation position or the effective monitoring range of the first fingerprint sensor 110 is displayed on the screen, so as to guide the user to perform fingerprint pressing.
- the size of the first fingerprint sensor 110 is not limited in the embodiment of the present application.
- the first fingerprint sensor 110 may adopt an optical fingerprint sensor; for example, the screen of the terminal device may be an Organic Light-Emitting Diode (OLED) screen or other self-illuminating display.
- OLED Organic Light-Emitting Diode
- the reflection of the finger pressing the screen may be different. Since the peak of the fingerprint and the light path corresponding to the grain are different, the position of the peak and the valley of the finger fingerprint can be obtained by detecting the reflected light, that is, the fingerprint image is obtained. .
- the optical fingerprint sensor itself may also include a light source and implement optical fingerprint detection using its own light source, in which case the screen may employ a non-self-illuminating display device, such as a liquid crystal display using backlight Device, etc.
- the first fingerprint sensor 110 may also be a capacitive fingerprint sensor or an ultrasonic fingerprint sensor or the like disposed under the screen and located in its display area.
- the second fingerprint sensor 120 may be a sensor using other fingerprint technologies, for example, a capacitive fingerprint sensor, an ultrasonic fingerprint sensor, or the first fingerprint.
- the sensor 120 is an optical fingerprint sensor or the like.
- the second fingerprint sensor 120 can be a push-type fingerprint sensor or a sliding fingerprint sensor, which is not limited in this application.
- the second fingerprint sensor 120 may be in the same plane as the first fingerprint sensor 110.
- the second fingerprint sensor 120 may be located around the screen of the terminal device, for example, a Home key position, or
- the second fingerprint sensor 120 can also be in a different plane from the first fingerprint sensor.
- the second fingerprint sensor 120 can be located at the back of the terminal device. The position of the second fingerprint sensor in this embodiment of the present application. Not limited.
- the processor 130 may determine the working mode of the first fingerprint sensor and the second fingerprint sensor according to the state of the terminal device.
- the state of the terminal device may include a shutdown state, Standby state, working state (or may also be called unlocked state).
- the standby state may include a boot-off state and a bright-screen unlocked state.
- the working status may include a bright screen unlocking state but does not receive a user's access request to the application or file (ie, unlocked but the user does not operate the application or file), and receives the user's access request to the application or file (ie, unlocked and the user The application or file is manipulated).
- the working modes of the first fingerprint sensor and the second fingerprint sensor may include: (1) the first fingerprint sensor is in an active state, and the second fingerprint sensor is in an inoperative state; (2) the first fingerprint The sensor is in an inoperative state, the second fingerprint sensor is in an active state; (3) the first fingerprint sensor and the second fingerprint sensor are in an inoperative state; or, (4) the first fingerprint sensor and The second fingerprint sensor is in an active state.
- the fingerprint sensor when the fingerprint sensor is in the working state, the finger touches the fingerprint sensor, and the fingerprint sensor can collect the fingerprint information; when the fingerprint sensor is in the non-working state, even if the finger touches the fingerprint sensor, the fingerprint sensor does not collect the fingerprint information, therefore, the fingerprint sensor It can reduce power consumption when it is not working.
- the inactive state may include a sleep state and a power-off state, wherein when the fingerprint sensor is in the sleep state, the power supply is still turned on, but the fingerprint sensor is not awake, and therefore, the fingerprint cannot be collected, and the fingerprint sensor is in the power-off state.
- the power supply is turned off, so fingerprints cannot be collected when the power is off.
- the processor 130 is specifically configured to:
- the terminal device When the terminal device is in working state and receives user access to an application or file, please In the case of obtaining, according to the security level of the application or the file, controlling the working mode of the first fingerprint sensor and the second fingerprint sensor according to a preset security level threshold; or
- the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
- the processor may control the first fingerprint sensor and the second fingerprint sensor to be in an inactive state when the terminal device is in a shutdown state, thereby reducing power consumption of the terminal device;
- the second fingerprint sensor is controlled to be in an active state, and the first fingerprint sensor is in an inoperative state, because the second fingerprint sensor is smaller than the first fingerprint sensor.
- the power consumption is low, therefore, the fingerprint verification by the second fingerprint sensor in the standby state is lower than the power consumption of the fingerprint verification by the first fingerprint sensor, and in the standby state, the screen does not have to be displayed on the screen.
- a fingerprint sensor is mounted to guide the user to press, and thus, power consumption can be further reduced.
- the first fingerprint sensor since the first fingerprint sensor is used for verification, it needs to cooperate with the display module and the touch module, and the fingerprint verification speed is slow, and the fingerprint verification by the second fingerprint sensor accelerates the unlocking speed, thereby Improve the user experience.
- the screen unlocking has relatively low security requirements. Therefore, considering the security and user experience, when the screen is unlocked, the second fingerprint sensor can be used for fingerprint verification, thereby improving the user experience.
- both the first fingerprint sensor and the second fingerprint sensor are controlled to be in an inoperative state.
- the first fingerprint sensor is controlled to be in an inactive state
- the second fingerprint sensor is in an active state.
- the second fingerprint sensor may be periodically awake from the sleep state, and detecting Is there a fingerprint press? If yes, the processor is woken up to perform fingerprint matching.
- the matching is passed, the terminal device is unlocked, and the terminal device enters a working state.
- the processor may select a security level of the file or the application accessed according to the access request, and a preset security level threshold. And determining an operation mode of the first fingerprint sensor and the second fingerprint sensor.
- the processor may control the first fingerprint sensor and the second if the file or the security level used reaches a preset security level threshold The fingerprint sensor is in working state, and the control only activates the first fingerprint sensor if the security level threshold is not reached.
- the processor may control the second fingerprint sensor to be in an inoperative state, and the first fingerprint sensor is also in an inoperative state; or In the case that the user's access request to the application or file is received, the processor may determine whether to open the first fingerprint sensor or the first fingerprint sensor and the second fingerprint sensor according to the security level of the application or the file.
- the processor may control the first fingerprint sensor and the The second fingerprint sensor is in an active state.
- the processor may first control to activate the first fingerprint sensor, and then start the second fingerprint sensor, or start the second fingerprint sensor first, and then start the device.
- the first fingerprint sensor may be activated, or the first fingerprint sensor and the second fingerprint sensor may be simultaneously activated, and the user determines which fingerprint sensor to input the fingerprint information first.
- the processor firstly starts the second fingerprint sensor as an example to describe how to perform fingerprint verification.
- the processor first starts the second fingerprint sensor.
- the processor may control the terminal device.
- the screen displays prompt information, the prompt information is used to prompt the user to input a fingerprint on the second fingerprint sensor, and when the second fingerprint sensor passes the verification, the first fingerprint sensor is controlled to be activated, and the finger press guide is performed.
- the user is prompted to input a fingerprint at the position of the first fingerprint sensor.
- the embodiment of the present application can also control the access security level to be higher than the preset security level.
- the control is verified by the first fingerprint sensor and the second fingerprint sensor, and when both fingerprint sensors are verified to pass, the verification can be determined, thereby further improving the fingerprint verification. safety.
- another security level threshold may also be preset, where the other security level threshold is lower than the foregoing security level threshold, and the processor may lower the security level of the application or file.
- the second fingerprint sensor is controlled to be in an active state, and the first fingerprint sensor is in an inoperative state, that is, the fingerprint is verified by the second fingerprint sensor. Therefore, the embodiment of the present application may be When a user accesses an application or a file with a low security level threshold, the second fingerprint sensor is used for fingerprint verification, thereby speeding up the unlocking and improving the user experience.
- the processor is specifically configured to: when the terminal device is in a standby state, control the first fingerprint sensor to be in an inactive state, the second finger The fingerprint sensor is in an active state; or in the case that the terminal device is in an active state and receives a user's access request for an application or a file, the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an active state Working state; or controlling the first fingerprint sensor and the second fingerprint sensor to be in an inoperative state if the terminal device is in an active state and the user does not receive an access request for an application or a file; or When the terminal device is in a shutdown state, the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
- the processor when receiving the user's access request for the application or the file, the processor may directly set the first fingerprint sensor to be in a working state without determining the security level of the application or the file.
- the second fingerprint sensor is in an inoperative state, that is, fingerprint verification is performed by the first fingerprint sensor.
- the processor is further configured to:
- Fingerprint recognition is performed according to an operation mode of the first fingerprint sensor and the second fingerprint sensor.
- the first fingerprint sensor is in an inoperative state and the second fingerprint sensor is in an active state, acquiring fingerprint information of the user by using the second fingerprint sensor, and performing fingerprint identification on the fingerprint information;
- the first fingerprint sensor When the first fingerprint sensor is in an active state and the second fingerprint sensor is in an inoperative state, acquiring fingerprint information of the user by using the first fingerprint sensor to perform fingerprint identification on the fingerprint information; or
- the first fingerprint sensor and the second fingerprint sensor When the first fingerprint sensor and the second fingerprint sensor are in an active state, the first fingerprint sensor and the second fingerprint sensor acquire fingerprint information of the user, and perform fingerprint identification on the fingerprint information.
- the functions performed by the processor 130 may be directly implemented by a hardware processor, or may be performed by a combination of hardware and software modules in the processor, or may be implemented by software.
- the module is executed to complete.
- the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
- the storage medium may be located in a memory of the terminal device, and the processor 130 may execute various functional applications or data processing in the terminal device by running a software program or module stored in the memory, and the memory may be
- the utility model mainly comprises a storage program area and a storage data area, wherein the storage program area can store an operating system and at least one function required
- the application such as a sound playing function, an image playing function, etc.
- the storage data area can store data (such as audio data, phone book, etc.) created according to the use of the terminal device 100.
- the memory may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the terminal device may be a mobile phone, a tablet computer, or the like, which is not limited in this embodiment of the present application.
- the first fingerprint sensor is higher in security than the second fingerprint sensor, and the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
- the terminal device implemented by the present application may include two fingerprint sensors, that is, a first fingerprint sensor and a second fingerprint sensor, wherein the security of the first fingerprint sensor is higher than that of the second fingerprint sensor, and the second The power consumption of the fingerprint sensor is lower than that of the first fingerprint sensor, so that when the terminal device is in the standby state, the second fingerprint sensor with less power consumption is used for unlocking, which speeds up the unlocking speed and improves the user experience, and pays in the mobile phone.
- the first fingerprint sensor with high security or the first fingerprint sensor and the second fingerprint sensor are used for fingerprint verification, thereby improving the security of fingerprint verification, and therefore, the security of fingerprint verification can be considered. Sex and user experience.
- the first fingerprint sensor 110 and the second fingerprint sensor 120 of the terminal device may respectively adopt different types of fingerprint sensors, such as the first A fingerprint sensor 110 employs an optical fingerprint sensor, and the second fingerprint sensor 120 employs a capacitive fingerprint sensor.
- One of the advantages of adopting the above configuration is that some users' fingerprint characteristics make them more easily recognized by the capacitive fingerprint sensor, and some users' fingerprint characteristics make them more easily recognized by the optical fingerprint sensor, so the terminal device can be applied. The fingerprint characteristics of different users are used to effectively improve the user experience.
- Another advantage of the above configuration is that different types of fingerprint sensors have advantages.
- the optical fingerprint sensor can perform fingerprint recognition more effectively and accurately when wet fingers or fingers are dusty, and can also realize living body detection;
- the capacitive fingerprint sensor has higher fingerprint recognition efficiency and shorter fingerprint unlocking time. Therefore, when the user selects one of the first fingerprint sensor 110 and the second fingerprint sensor 120 to perform fingerprint recognition in different application scenarios, the application requirements of different scenarios are met.
- the device embodiment of the present application is described in detail above with reference to FIG. 1.
- the method embodiment of the present application is described in detail below with reference to FIG. 2 to FIG. 5. It should be understood that the method embodiment corresponds to the device embodiment. A similar description can be referred to the device embodiment.
- FIG. 2 is a schematic flowchart of a method 200 for identifying a fingerprint according to an embodiment of the present application. As shown in FIG. 2, the method 200 includes:
- S210 Control an operation mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device, where the first fingerprint sensor is built in a screen of the terminal device, and the second fingerprint sensor is located in the terminal. a location other than the screen in the device;
- S220 Perform fingerprint identification according to an operation mode of the first fingerprint sensor and the second fingerprint sensor.
- the controlling the working modes of the first fingerprint sensor and the second fingerprint sensor according to the state of the terminal device including:
- the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
- controlling, according to a security level of the application or file, a working mode of the first fingerprint sensor and the second fingerprint sensor according to a preset security level threshold include:
- the first fingerprint sensor When the security level of the application or file does not reach the preset security level threshold, the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an inoperative state.
- the controlling the working modes of the first fingerprint sensor and the second fingerprint sensor according to the state of the terminal device including:
- the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
- performing fingerprint identification according to an operation mode of the first fingerprint sensor and the second fingerprint sensor including:
- the first fingerprint sensor When the first fingerprint sensor is in an inoperative state and the second fingerprint sensor is in an active state, acquiring fingerprint information of the user by using the second fingerprint sensor to perform fingerprint identification on the fingerprint information; or
- the first fingerprint sensor When the first fingerprint sensor is in an active state and the second fingerprint sensor is in an inoperative state, acquiring fingerprint information of the user by using the first fingerprint sensor to perform fingerprint identification on the fingerprint information; or
- the first fingerprint sensor and the second fingerprint sensor When the first fingerprint sensor and the second fingerprint sensor are in an active state, the first fingerprint sensor and the second fingerprint sensor acquire fingerprint information of the user, and perform fingerprint identification on the fingerprint information.
- the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
- the first fingerprint sensor is more secure than the second fingerprint sensor.
- the second fingerprint sensor and the first fingerprint sensor are in the same plane or different planes.
- the method 200 may be performed by a processor in a terminal device, which may be the processor 130 shown in FIG. 1.
- the terminal device may further include a memory, and the memory may be used for Storing a program, instruction or code, the processor can execute a program, instruction or code stored in the memory such that the terminal device can execute the corresponding content in method 200.
- the content of the method disclosed in the embodiment of the present application may be directly implemented by a hardware processor, or may be implemented by using a combination of hardware and software modules in a processor, or by using a software module.
- the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
- the storage medium is located in a memory of the terminal device, and the processor in the terminal device can read information in the memory to complete the content of the foregoing method. To avoid repetition, it will not be described in detail here.
- the method for recognizing a fingerprint in the embodiment of the present application is described in detail by using the terminal device as a mobile phone as an example, but the embodiment of the present application should not be limited.
- the first fingerprint sensor included in the mobile phone is located at a specific position of the screen, and the second fingerprint sensor is located at the back of the mobile phone as an example.
- the present invention should not be limited in any way.
- the positions of the first fingerprint sensor and the second fingerprint sensor may refer to the foregoing embodiments, and are not described herein for brevity.
- FIG. 3 is a schematic diagram of the mobile phone in a standby state.
- the first fingerprint sensor is in an inoperative state
- the second fingerprint sensor is in an active state. Therefore, as shown in FIG.
- the second fingerprint sensor performs the screen waking or the bright screen unlocking. Therefore, the second fingerprint sensor is used for fingerprint verification.
- the installation position of the first fingerprint sensor needs to be displayed on the screen to facilitate guiding. The user presses the fingerprint, resulting in a problem of large power consumption.
- the first fingerprint sensor is in a working state, and the second fingerprint sensor is in a non-working state.
- Fingerprint verification by the first fingerprint sensor since the size of the first fingerprint sensor is larger than the size of the second fingerprint sensor, which is equivalent to increasing the length of the password, the security of fingerprint recognition is high.
- the payment software can control the display of the guiding position on the screen of the mobile phone by accessing a processor in the mobile phone, for example, a software middleware in the processor.
- the guiding position is a mounting position of the first fingerprint sensor, and the user presses the guiding position, so that the first fingerprint sensor can collect fingerprint information of the user, and after the collection is completed, the fingerprint can be verified. After the verification is passed, Payment can be granted.
- the size of the sequence numbers of the foregoing processes does not mean the order of execution sequence, and the order of execution of each process should be determined by its function and internal logic, and should not be applied to the embodiment of the present application.
- the implementation process constitutes any limitation.
- the disclosed systems, devices, and methods may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
- the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including Several instructions are used to make a computer device (which can be a personal computer, a server, Either a network device or the like) performs all or part of the steps of the method described in the various embodiments of the present application.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
- Image Input (AREA)
- Collating Specific Patterns (AREA)
Abstract
L'invention concerne un dispositif de terminal et un procédé de reconnaissance d'empreinte digitale. Selon différents états d'un dispositif terminal, différents capteurs d'empreintes digitales peuvent être utilisés pour la reconnaissance d'empreintes digitales, de sorte que à la fois la sécurité de la vérification d'empreintes digitales et l'expérience d'utilisateur peuvent être prises en considération. Le dispositif terminal comprend : un premier capteur d'empreinte digitale, un second capteur d'empreinte digitale, et un processeur, le premier capteur d'empreinte digitale étant intégré dans un écran du dispositif de terminal, le second capteur d'empreinte digitale étant situé à des positions, autre que l'écran, dans le dispositif terminal, et le processeur est utilisé pour contrôler, en fonction de l'état du dispositif terminal, les modes de fonctionnement du premier capteur d'empreinte digitale et du second capteur d'empreinte digitale.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/076950 WO2018165942A1 (fr) | 2017-03-16 | 2017-03-16 | Dispositif terminal et procédé de reconnaissance d'empreintes digitales |
CN201780000515.3A CN107113349B (zh) | 2017-03-16 | 2017-03-16 | 终端设备和识别指纹的方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/076950 WO2018165942A1 (fr) | 2017-03-16 | 2017-03-16 | Dispositif terminal et procédé de reconnaissance d'empreintes digitales |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018165942A1 true WO2018165942A1 (fr) | 2018-09-20 |
Family
ID=59664554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/076950 WO2018165942A1 (fr) | 2017-03-16 | 2017-03-16 | Dispositif terminal et procédé de reconnaissance d'empreintes digitales |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107113349B (fr) |
WO (1) | WO2018165942A1 (fr) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107113349B (zh) * | 2017-03-16 | 2019-01-18 | 深圳市汇顶科技股份有限公司 | 终端设备和识别指纹的方法 |
CN107742074A (zh) * | 2017-11-10 | 2018-02-27 | 广东小天才科技有限公司 | 一种指纹解锁方法、装置及设备 |
CN108200228B (zh) * | 2017-11-28 | 2020-07-31 | 努比亚技术有限公司 | 终端指纹识别模组管理方法、终端及计算机可读存储介质 |
CN111417955B (zh) * | 2018-03-26 | 2023-03-28 | 华为技术有限公司 | 一种指纹验证的方法及电子设备 |
CN109086582B (zh) * | 2018-06-15 | 2022-12-13 | 华云数智科技(深圳)有限公司 | 一种指纹认证方法、终端及计算机可读存储介质 |
CN109359453B (zh) * | 2018-09-04 | 2021-08-24 | Oppo(重庆)智能科技有限公司 | 解锁方法及相关产品 |
EP3674856B1 (fr) * | 2018-09-25 | 2023-04-12 | Shenzhen Goodix Technology Co., Ltd. | Procédé et système de collecte d'empreintes digitales sur écran basés sur de multiples capteurs, et dispositif électronique |
CN109508522B (zh) * | 2018-11-16 | 2022-03-18 | Oppo广东移动通信有限公司 | 一种数据清除方法、装置、存储介质及终端 |
CN117715031A (zh) * | 2023-05-29 | 2024-03-15 | 荣耀终端有限公司 | 一种保护指纹信息的方法及电子设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104156709A (zh) * | 2014-08-26 | 2014-11-19 | 南昌欧菲生物识别技术有限公司 | 指纹识别检测组件、终端设备及指纹验证方法 |
CN204066116U (zh) * | 2014-05-09 | 2014-12-31 | 敦泰科技有限公司 | 具有指纹感测功能的电子设备及其驱动电路 |
CN105184228A (zh) * | 2015-08-13 | 2015-12-23 | 小米科技有限责任公司 | 移动设备及其屏幕模组、指纹采集方法、装置及电子设备 |
CN107113349A (zh) * | 2017-03-16 | 2017-08-29 | 深圳市汇顶科技股份有限公司 | 终端设备和识别指纹的方法 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102158211B1 (ko) * | 2013-10-18 | 2020-09-22 | 엘지전자 주식회사 | 이동 단말기 및 이의 제어 방법 |
CN106295477A (zh) * | 2015-06-03 | 2017-01-04 | 小米科技有限责任公司 | 一种进行指纹识别的终端 |
CN205942699U (zh) * | 2016-06-23 | 2017-02-08 | 深圳市恒盛通科技有限公司 | 一种带有指纹识别模块的移动终端 |
CN205942700U (zh) * | 2016-07-06 | 2017-02-08 | 成都锐成芯微科技有限责任公司 | 移动终端指纹识别系统 |
-
2017
- 2017-03-16 CN CN201780000515.3A patent/CN107113349B/zh active Active
- 2017-03-16 WO PCT/CN2017/076950 patent/WO2018165942A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204066116U (zh) * | 2014-05-09 | 2014-12-31 | 敦泰科技有限公司 | 具有指纹感测功能的电子设备及其驱动电路 |
CN104156709A (zh) * | 2014-08-26 | 2014-11-19 | 南昌欧菲生物识别技术有限公司 | 指纹识别检测组件、终端设备及指纹验证方法 |
CN105184228A (zh) * | 2015-08-13 | 2015-12-23 | 小米科技有限责任公司 | 移动设备及其屏幕模组、指纹采集方法、装置及电子设备 |
CN107113349A (zh) * | 2017-03-16 | 2017-08-29 | 深圳市汇顶科技股份有限公司 | 终端设备和识别指纹的方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107113349A (zh) | 2017-08-29 |
CN107113349B (zh) | 2019-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018165942A1 (fr) | Dispositif terminal et procédé de reconnaissance d'empreintes digitales | |
US11698792B2 (en) | Method for starting up device and device | |
US10728442B2 (en) | Initializing camera subsystem for face detection based on sensor inputs | |
US9396380B2 (en) | Finger print sensor and auxiliary processor integration in an electronic device | |
US9665762B2 (en) | Tiered wakeup strategy | |
CN107765774B (zh) | 待机状态下基于指纹识别的终端登录方法、系统 | |
US20140189604A1 (en) | Method and system for unlocking a touchscreen of an electronic device | |
CN107223254B (zh) | 用于隐藏设置处理的方法、用户装置和存储介质 | |
CN106485124B (zh) | 一种移动终端的操作控制方法及移动终端 | |
EP3526959B1 (fr) | Procédé d'acquisition de données biométriques et dispositif électronique associé | |
CN107450839B (zh) | 基于黑屏手势的控制方法、装置、存储介质及移动终端 | |
US20140002240A1 (en) | Expedited Biometric Validation | |
JP6982069B2 (ja) | 指紋収集方法及び端末 | |
WO2019101096A1 (fr) | Procédé et dispositif de vérification de sécurité et terminal mobile | |
WO2020098412A1 (fr) | Procédé et appareil de nettoyage de données, et support de stockage et terminal | |
CN106250747B (zh) | 一种信息处理方法及电子设备 | |
WO2019019817A1 (fr) | Procédé et appareil de commande fondés sur un geste d'écran noir, support d'informations et terminal mobile | |
JP2019008527A (ja) | 情報処理装置、生体認証制御方法、及び生体認証制御プログラム | |
WO2019134116A1 (fr) | Procédé d'interaction avec une interface utilisateur et dispositif terminal | |
US9824219B2 (en) | Electronic device having wake up verification and electronic system having the electronic device | |
US20180314811A1 (en) | Electronic devices and methods for controlling user interface | |
TWI430133B (zh) | 生物感測啟動裝置、生物特徵感測控制之啟動管理系統及其方法 | |
US11587307B2 (en) | Control method and electronic apparatus | |
TW201702797A (zh) | 電子裝置及其啟動方法 | |
US20230176643A1 (en) | Touch based computing devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17900890 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17900890 Country of ref document: EP Kind code of ref document: A1 |