WO2018227584A1 - 指纹识别的方法、装置和设备 - Google Patents

指纹识别的方法、装置和设备 Download PDF

Info

Publication number
WO2018227584A1
WO2018227584A1 PCT/CN2017/088721 CN2017088721W WO2018227584A1 WO 2018227584 A1 WO2018227584 A1 WO 2018227584A1 CN 2017088721 W CN2017088721 W CN 2017088721W WO 2018227584 A1 WO2018227584 A1 WO 2018227584A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
template
security level
target
module
Prior art date
Application number
PCT/CN2017/088721
Other languages
English (en)
French (fr)
Inventor
卜红丽
张兴国
李洪生
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to PCT/CN2017/088721 priority Critical patent/WO2018227584A1/zh
Priority to CN201780000478.6A priority patent/CN107438847A/zh
Publication of WO2018227584A1 publication Critical patent/WO2018227584A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6054Biometric subscriber identification

Definitions

  • Embodiments of the present application relate to the field of biometrics, and more particularly, to a method, apparatus, and device for fingerprint recognition.
  • the present application provides a method, device, and device for fingerprint recognition, which can meet the requirements for fingerprint recognition performance in different application scenarios (or different operations).
  • a method for fingerprint identification comprising: verifying a target fingerprint according to a target security level corresponding to an operation to be performed, the target security level being one of multiple security levels, the multiple Different security levels in the security level correspond to different fingerprint verification methods; according to the verification result, it is determined whether to perform the to-be-executed operation.
  • the device verifies the obtained fingerprint according to the security level of the operation to be performed (or the current application scenario of the fingerprint identification), due to different security levels.
  • different fingerprint verification methods will bring different fingerprint recognition performance, which can meet the requirements of fingerprint recognition performance in different application scenarios.
  • the fingerprint identification method of the embodiment of the present application is applied to a device having at least one fingerprint module, and each fingerprint module can acquire at least one fingerprint in one fingerprint recognition process.
  • the target fingerprint includes a first fingerprint, or the target fingerprint includes a first fingerprint and a second fingerprint.
  • the device includes only one fingerprint module
  • the target fingerprint includes the first fingerprint and the second fingerprint
  • the first fingerprint and the second fingerprint are the fingerprint module
  • the fingerprint module is used twice before and during the fingerprint identification process. Two fingerprints collected.
  • the fingerprint identification device saves the first fingerprint.
  • the fingerprint identification device collects the second fingerprint
  • the first fingerprint is verified according to the target security level corresponding to the operation to be performed. Fingerprint and second fingerprint.
  • the fingerprint identification device verifies the target security level corresponding to the to-be-executed operation after the fingerprint module acquires the first fingerprint.
  • the first fingerprint may be one fingerprint or multiple fingerprints.
  • the device includes the first fingerprint module and the second fingerprint module, and the target fingerprint includes the first fingerprint and the second fingerprint
  • the first fingerprint is a fingerprint collected by the first fingerprint module
  • the second The fingerprint is a fingerprint collected by the second fingerprint module.
  • the fingerprint identification device verifies the first fingerprint and the second fingerprint according to the target security level corresponding to the operation to be performed.
  • the device includes the first fingerprint module and the second fingerprint module
  • the target fingerprint includes only the first fingerprint collected by the first fingerprint module or only the second fingerprint module is collected.
  • the fingerprint identification device verifies the first fingerprint or the second fingerprint according to the target security level corresponding to the operation to be performed after the first fingerprint module acquires the first fingerprint or the second fingerprint module collects the second fingerprint.
  • the first fingerprint may be one fingerprint or multiple fingerprints
  • the second fingerprint may be one or more fingerprints.
  • the fingerprint identification method of the present application when the fingerprint identification method of the present application is applied to a device having a first fingerprint module and a second fingerprint module, the user can freely select whether the fingerprint recognition mode is a single fingerprint recognition mode or a dual fingerprint recognition mode, which can be increased. The ease of use of the mobile phone fingerprint recognition function. Further, when the user selects the dual fingerprint recognition mode and inputs the fingerprint through the first fingerprint module and the second fingerprint module, the device will use the comprehensive verification result of the fingerprints collected by the two fingerprint modules as the final verification result, thereby improving The security performance of fingerprint recognition.
  • the target fingerprint includes a first fingerprint and a second fingerprint
  • the target security level is a first security level
  • the verifying the target fingerprint according to the target security level corresponding to the operation to be performed includes: determining whether the first fingerprint template and/or the second fingerprint exists in the fingerprint template set corresponding to the to-be-executed operation according to the first matching threshold a template, wherein the first fingerprint template and the first fingerprint Matching, the second fingerprint template is matched with the second fingerprint; when the first fingerprint template and/or the second fingerprint template are present in the fingerprint template set according to the first matching threshold , to confirm the verification is successful.
  • the verifying the target fingerprint according to the target security level corresponding to the operation to be performed further includes: determining, according to the first matching threshold, When the first fingerprint template and the second fingerprint template are not present in the fingerprint template set, determining whether the first fingerprint template and the second fingerprint template exist in the fingerprint template set according to the second matching threshold The second matching threshold is smaller than the first matching threshold; when it is determined that the first fingerprint template and the second fingerprint template are present in the fingerprint template set according to the second matching threshold, it is determined that the verification is successful.
  • the first matching threshold and/or the second matching threshold are preset values, and the first matching threshold and the second matching threshold are not limited in this application.
  • the matching condition is lowered and further verification is performed. If the verification is successful after reducing the matching condition, the verification is considered successful. Thereby, the accuracy of fingerprint recognition can be improved.
  • the target fingerprint includes a first fingerprint and a second fingerprint, and the target security level is a second security level;
  • the verification of the target fingerprint according to the target security level of the operation to be performed includes: determining, according to the third matching threshold, whether the first fingerprint template and/or the second fingerprint template exists in the fingerprint template set corresponding to the to-be-executed operation. And the first fingerprint template is matched with the first fingerprint, the second fingerprint template is matched with the second fingerprint, and the first fingerprint template set is determined according to the third matching threshold. When a fingerprint template and/or the second fingerprint template is used, it is determined that the verification is successful.
  • the target security level is a second security level
  • the verification of the target fingerprint according to the target security level of the operation to be performed includes: determining whether the fingerprint template set corresponding to the to-be-executed operation exists according to the third matching threshold when the target fingerprint includes the first fingerprint The first fingerprint template is matched with the first fingerprint; when it is determined that the first fingerprint template exists in the fingerprint template set according to the third matching threshold, it is determined that the verification is successful.
  • the target fingerprint includes a first fingerprint and a second fingerprint
  • the target security level is a third security level
  • the verification of the target fingerprint according to the target security level corresponding to the operation to be performed includes: determining whether the first fingerprint template and the second fingerprint template exist in the fingerprint template set corresponding to the to-be-executed operation according to the fourth matching threshold.
  • the first fingerprint template is matched with the first fingerprint
  • the second fingerprint template is matched with the second fingerprint; determining that the first fingerprint exists in the fingerprint template set according to the fourth matching threshold
  • the third matching threshold may be the same as or different from the first matching threshold
  • the fourth matching threshold may be the same as or different from the first matching threshold
  • the third matching threshold is matched with the fourth.
  • the thresholds may be the same or different.
  • the method is applied to a device having a first fingerprint module and a second fingerprint module, where The target security level, before verifying the target fingerprint, the method further includes: determining that the fingerprint identification mode selected by the user is a dual fingerprint recognition mode.
  • the fingerprint template set is user data stored in the device, and is fingerprint data that is registered or reserved when the fingerprint recognition function is enabled in advance, and is used as a template for fingerprint verification.
  • the device stores the fingerprint template set in the cloud synchronously. When the device loses the locally stored fingerprint data, the fingerprint data can be obtained from the cloud through the network and stored locally.
  • the fingerprint recognition mode selected by the user is the dual fingerprint recognition mode
  • the method for fingerprint recognition in the first aspect and the foregoing implementation manner is performed.
  • the fingerprint recognition mode selected by the user is the single fingerprint recognition mode
  • the same fingerprint recognition method as in the prior art is performed.
  • the method further includes: when the user selects the dual fingerprint identification mode, collecting the first fingerprint by using the first fingerprint module, and adopting the first The second fingerprint module collects a second fingerprint; wherein the first fingerprint module and the second fingerprint module are two different fingerprint modules configured on the same electronic device, and the first fingerprint and the first fingerprint The second fingerprint is a fingerprint of a different finger of the user collected by the first fingerprint module and the second fingerprint module.
  • the verifying the target fingerprint according to the target security level corresponding to the operation to be performed includes: determining a target security level corresponding to the operation to be performed,
  • the target security level is a preset first security level, One of a second security level and a third security level; the first fingerprint and the second fingerprint are verified according to the target security level, wherein different security levels correspond to Different fingerprint verification methods.
  • the performing, by using a corresponding fingerprint verification manner, the first fingerprint and the second fingerprint according to the target security level includes: when the target security level is the first security level, adopting a first matching condition and determining whether the first fingerprint and the second fingerprint respectively match the registered fingerprint template; Under a matching condition, when at least one of the first fingerprint and the second fingerprint is successfully matched, the fingerprint verification passes.
  • the first fingerprint and the second fingerprint are verified according to the target security level by using a corresponding fingerprint verification manner
  • the method further includes: when the first fingerprint and the second fingerprint fail to match, adopt a second matching condition, and re-determine whether there is a registered fingerprint template that matches the first fingerprint and the second fingerprint respectively.
  • the second matching condition is lower than the first matching condition; when the first fingerprint and the second fingerprint are both successfully matched under the second matching condition, the fingerprint verification is passed.
  • the determining, by the corresponding fingerprint verification manner, the first fingerprint and the second fingerprint according to the target security level Performing verification, including: when the target security level is the second security level, adopting a third matching condition and determining whether there is a registered fingerprint template that matches the first fingerprint or the second fingerprint; A fingerprint or the second fingerprint is successfully matched, and the fingerprint verification is passed.
  • the verification includes: when the target security level is the second security level, adopting a third matching condition and determining whether there is a registered fingerprint template that matches the first fingerprint and the second fingerprint; The fingerprint or the second fingerprint does not all fail to match, and the fingerprint verification passes.
  • the verification includes: when the target security level is the third security level, adopting a fourth matching condition and determining whether there is a registered fingerprint template that matches the first fingerprint and the second fingerprint; When the fingerprint and the second fingerprint are both matched successfully, the fingerprint verification is passed; Otherwise, fingerprint verification does not pass.
  • an apparatus for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
  • the apparatus comprises functional modules for performing the method of any of the above-described first aspect or any of the possible implementations of the first aspect.
  • an apparatus comprising at least one fingerprint module, a processor and a memory.
  • the processor, the memory, and the at least one fingerprint module communicate with each other through an internal connection path, and transmit control and/or data signals, so that the device performs any of the foregoing first aspect or the first aspect.
  • the method in the implementation is provided.
  • a computer readable medium for storing a computer program, the computer program comprising instructions for performing the first aspect or any of the possible implementations of the first aspect.
  • a computer program product comprising instructions for performing a fingerprint in any of the first aspect or the first aspect of the first aspect when the computer runs the finger of the computer program product The method of identification.
  • the computer program product can be run on the device of the third aspect described above.
  • FIG. 1 is a schematic flowchart of a method for fingerprint recognition according to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a method for collecting fingerprints by two fingerprint modules located on both sides of a device according to an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a method of acquiring a fingerprint by a single fingerprint module located on a side of a device according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a method of acquiring a fingerprint by a single fingerprint module located on a side of a device according to another embodiment of the present application.
  • FIG. 5 is a schematic diagram of a method for acquiring fingerprints by two fingerprint modules located on the front and back of the device according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a method for acquiring a fingerprint by a fingerprint module located on the front of the device according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a method of acquiring a fingerprint by a fingerprint module located on the back of the device according to an embodiment of the present application.
  • FIG. 8 is two fingerprints passing through the front and side of the device, respectively, in accordance with an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a method of acquiring fingerprints by two fingerprint modules respectively located on the front and side of the device, according to another embodiment of the present application.
  • FIG. 10 is a schematic diagram of a method of acquiring fingerprints by two fingerprint modules respectively located on the back and sides of the device, according to an embodiment of the present application.
  • FIG. 11 is a schematic diagram of a method of acquiring fingerprints by two fingerprint modules respectively located on the back and sides of the device, according to another embodiment of the present application.
  • FIG. 12 is a schematic flowchart of a method for fingerprint recognition according to an embodiment of the present application.
  • FIG. 13 is a schematic flowchart of a method for fingerprint recognition according to another embodiment of the present application.
  • FIG. 14 is a schematic flowchart of a method for fingerprint recognition according to still another embodiment of the present application.
  • FIG. 15 is a schematic flowchart of a method for fingerprint recognition according to still another embodiment of the present application.
  • 16 is a schematic block diagram of an apparatus for fingerprint recognition according to an embodiment of the present application.
  • 17 is a schematic block diagram of an apparatus in accordance with an embodiment of the present application.
  • the device for fingerprint recognition in the embodiment of the present application may be a fingerprint identification chip.
  • the device in the embodiment of the present application may be an electronic device equipped with a fingerprint identification chip, such as a mobile phone, a tablet computer, or a notebook computer.
  • the fingerprint identification chip in the embodiment of the present application may be a push fingerprint identification chip, a scratch fingerprint identification chip or a touch fingerprint recognition chip.
  • the device includes a first fingerprint module and a second fingerprint module, and each fingerprint module collects only one fingerprint in a fingerprint identification process as an example, just for convenience of description. It is not intended to limit the scope of the application.
  • FIG. 1 illustrates a method 100 of fingerprinting in accordance with an embodiment of the present application, which may be performed by a device for fingerprint recognition. As shown in FIG. 1, the method 100 includes:
  • S110 Verify a target fingerprint according to a target security level corresponding to the operation to be performed, where the target security level is one of multiple security levels, and different security levels of the multiple security levels correspond to different fingerprint verification modes;
  • the obtained fingerprint is verified according to the security level of the operation to be performed, and different fingerprint verification methods are adopted because different security levels correspond to different fingerprint verification modes. Different fingerprint recognition performance can meet the requirements of fingerprint recognition performance in different application scenarios.
  • two fingerprint recognition modes are preset, which are a single fingerprint recognition mode and a dual fingerprint recognition mode, and the user can select a fingerprint recognition mode by setting.
  • the user selects the fingerprint recognition mode as the single fingerprint recognition mode, only the first fingerprint recognition module may be activated, or only the second fingerprint recognition module may be activated.
  • the dual fingerprint recognition mode the first fingerprint recognition module and the second fingerprint recognition module are activated.
  • the dual fingerprint identification mode the user can input the first fingerprint through the first fingerprint identification module, and input the second fingerprint through the second fingerprint identification module, and the user can also select to input only through the first fingerprint identification module.
  • the first fingerprint, or the second fingerprint is input only through the second fingerprint identification module.
  • the first fingerprint module is located on the left side of the device, and the second fingerprint module is located on the right side of the device.
  • the fingerprint recognition mode selected by the user is the dual fingerprint recognition mode, the user can simultaneously input the fingerprints of different fingers of the same hand through the first fingerprint module and the second fingerprint module, and the fingerprint can be completely fingerprinted with one hand, and the operation is convenient.
  • the user may select only the first fingerprint module to input the fingerprint of one finger, or as shown in FIG. 4, the user may select only the second fingerprint module to input the fingerprint of one finger.
  • the first fingerprint module is located on the front side of the device, and the second fingerprint module is located on the back of the device.
  • the first fingerprint module can be used as a Home button of the device to reduce the number of buttons on the front of the device.
  • the fingerprint recognition mode selected by the user is the dual fingerprint recognition mode
  • the user can simultaneously input the fingerprints of different fingers of the same hand through the first fingerprint module and the second fingerprint module.
  • the user may select only the first fingerprint module to input the fingerprint of one finger, or as shown in FIG. 7, the user may select only the second fingerprint module to input the fingerprint of one finger.
  • the first fingerprint module is located on the front side of the device, and the second fingerprint module is located on the side of the device. If the fingerprint recognition mode selected by the user is the dual fingerprint identification mode, the user may pass the A fingerprint module and a second fingerprint module input fingerprints of different fingers of the same hand or fingerprints of different hands. Or the user may select only the first fingerprint module to input the fingerprint of one finger, or the user may select only the second fingerprint module to input the fingerprint of one finger.
  • the first fingerprint module is located on the back of the device, and the second The fingerprint module is located on the side of the device. If the fingerprint recognition mode selected by the user is the dual fingerprint recognition mode, the user can input fingerprints of different fingers of the same hand or fingerprints of different hands through the first fingerprint module and the second fingerprint module. Or the user may select only the first fingerprint module to input the fingerprint of one finger, or the user may select only the second fingerprint module to input the fingerprint of one finger.
  • the first correspondence between the operation and the security level and the second correspondence between the security level and the fingerprint verification mode are preset in the device for fingerprint identification.
  • the target security level corresponding to the to-be-executed operation is determined according to the first correspondence, and then the fingerprint verification mode corresponding to the target security level is determined according to the second correspondence.
  • the level of security corresponds to the level of requirements for fingerprint recognition performance.
  • the security level includes three security levels, from low to high, respectively, security level I (low security level), security level II (medium security level), and security level III (high security level).
  • Operations include screen unlocking, application unlocking.
  • the first correspondence may have the form shown in Table 1.
  • the fingerprint verification method includes the fingerprint verification method I, the fingerprint verification method II, and the fingerprint verification method III as an example, and the second correspondence relationship may have the form shown in Table 2.
  • the user may actually set the first correspondence between the operation and the security level, and the second correspondence between the security level and the fingerprint verification mode.
  • the fingerprint identification method of the method 100 is performed.
  • the fingerprint identification method in the related art is adopted.
  • FIG. 12 illustrates a method 200 for fingerprint identification according to an embodiment of the present application.
  • the security level corresponding to the operation to be performed in the method 200 is a first security level (optionally corresponding to the security level I), and the fingerprint selected by the user.
  • the recognition mode is a dual fingerprint recognition mode. As shown in FIG. 12, method 200 includes:
  • the first fingerprint module collects the first fingerprint
  • the second fingerprint module collects the second fingerprint
  • S220 Determine whether the first fingerprint matches the registered fingerprint template, and determine whether the second fingerprint matches the registered fingerprint template.
  • the registered fingerprint templates corresponding to different operations can be different.
  • the registered fingerprint template corresponding to the screen unlocking includes the fingerprint of the right thumb and the fingerprint of the right index finger
  • the registered fingerprint template corresponding to the fingerprint payment includes the fingerprint of the right thumb and the fingerprint of the right middle finger. Therefore, the registered fingerprint template in S220 refers to a registered fingerprint template corresponding to the operation to be performed.
  • the operation of determining whether the first fingerprint matches the registered fingerprint template is performed by the first processing module corresponding to the first fingerprint module, and determining whether the second fingerprint matches the registered fingerprint template is determined by The second processing module corresponding to the second fingerprint module is executed.
  • the first processing module and the second processing module operate independently, and the method for fingerprint recognition is performed with respect to a single fingerprint module and a single processing module in the prior art, and the result of fingerprint recognition can be improved without increasing the time of fingerprint recognition. Reliability.
  • the first processing module extracts a feature point of the first fingerprint, and then calculates a similarity between the feature point of the first fingerprint and the feature point of the registered fingerprint template, if the similarity is greater than or equal to the first A matching threshold indicates that the first fingerprint match is successful, otherwise the match fails.
  • the second processing module extracts the feature points of the second fingerprint, and then calculates the similarity between the feature points of the second fingerprint and the feature points of the registered fingerprint template. If the similarity is greater than or equal to the first matching threshold, the second fingerprint is considered to be successfully matched. Otherwise the match fails.
  • the fingerprint matching method may be any one of the related technologies, which is not limited in this application.
  • the reduced matching condition herein refers to lowering the matching threshold. Specifically, if S230 If the result is yes, the first processing module determines whether the first fingerprint is successfully matched according to the second matching threshold, and the second processing module determines, according to the second matching threshold, whether the second fingerprint is successfully matched.
  • the second matching threshold is less than the first matching threshold.
  • the value of the first matching threshold and the second matching threshold may be preset values, or may be values set by the user according to needs.
  • the to-be-executed operation is directly performed.
  • the fingerprint identification process ends.
  • FIG. 13 illustrates a method 300 for fingerprint identification according to another embodiment of the present application.
  • the security level corresponding to the operation to be performed in the method 300 is a second security level (optionally corresponding to the security level II), and the user selects
  • the fingerprint recognition mode is a single fingerprint recognition mode, or the user selects the dual fingerprint recognition mode but inputs the fingerprint through only one fingerprint module.
  • method 300 includes:
  • S320 Determine whether the first fingerprint matches the registered fingerprint template, or determine whether the second fingerprint matches the registered fingerprint template.
  • the fingerprint identification process ends.
  • the following setting may be performed: in the dual fingerprint identification mode, if the time difference between the fingerprints collected by the first fingerprint module and the second fingerprint module is less than or equal to the preset time difference, the user is considered as Entering two fingerprints through the first fingerprint module and the second fingerprint module; if the time difference between the fingerprints collected by the first fingerprint module and the second fingerprint module is greater than the preset time difference, the user is considered to be only The fingerprint module that collects the fingerprint inputs a fingerprint.
  • the fingerprint module of the first fingerprint module and the second fingerprint module collects the fingerprint input by the user, the first fingerprint module and the second fingerprint module after the preset time difference The other one in the user does not collect the fingerprint input by the user, and the user is considered to input a fingerprint only through the fingerprint module of the first fingerprint module and the second fingerprint module.
  • FIG. 14 illustrates a method 400 for fingerprint identification according to still another embodiment of the present application.
  • the security level corresponding to the operation to be performed in the method 400 is a second security level (optionally corresponding to the security level II), and the user selects
  • the fingerprint recognition mode is a dual fingerprint recognition mode.
  • method 400 includes:
  • the first fingerprint module collects the first fingerprint
  • the second fingerprint module collects the second fingerprint
  • S420 Determine whether the first fingerprint matches the registered fingerprint template, and determine whether the second fingerprint matches the registered fingerprint template.
  • the fingerprint recognition process is ended.
  • FIG. 15 illustrates a method 500 for fingerprint identification according to still another embodiment of the present application.
  • the security level corresponding to the operation to be performed in the method 500 is a third security level (optionally corresponding to the security level III), and the user selects
  • the fingerprint recognition mode is a dual fingerprint recognition mode.
  • method 500 includes:
  • the first fingerprint module collects the first fingerprint
  • the second fingerprint module collects the second fingerprint
  • S520 Determine whether the first fingerprint matches the registered fingerprint template, and determine whether the second fingerprint matches the registered fingerprint template.
  • the fingerprint identification process ends.
  • the method for fingerprint matching in the methods 300-500 is the same as in the method 200. To avoid repetition, the related description is omitted as appropriate.
  • the matching thresholds used in fingerprint matching in the method 300, the method 400, and the method 500 may be the same or different.
  • a third matching threshold may be employed in method 300 and method 400
  • a fourth matching threshold may be employed in method 500.
  • the values of the third matching threshold and the fourth matching threshold are also not limited in the present application.
  • FIG. 16 A method of fingerprint recognition according to an embodiment of the present application is described in detail above with reference to FIGS. 1 through 15.
  • a device 10 for fingerprint recognition according to an embodiment of the present application will be described in detail below with reference to FIG. 16, which includes:
  • the obtaining module 11 is configured to acquire a target fingerprint
  • the processing module 12 is configured to verify the target according to a target security level corresponding to the operation to be performed a fingerprint, the target security level is one of a plurality of security levels, and different security levels of the multiple security levels correspond to different fingerprint verification modes;
  • the processing module 13 is further configured to determine whether to perform the to-be-executed operation according to the verification result.
  • the device for fingerprint identification after acquiring the fingerprint input by the user, verifies the obtained fingerprint according to the security level of the operation to be performed, because different security levels correspond to different fingerprint verification methods, Different fingerprint verification methods will bring different fingerprint recognition performance, which can meet the requirements of fingerprint recognition performance in different application scenarios.
  • the target fingerprint includes a first fingerprint and a second fingerprint
  • the target security level is a first security level
  • the processing module 12 is specifically configured to: determine, according to the first matching threshold, whether a first fingerprint template and/or a second fingerprint template exists in the fingerprint template set corresponding to the to-be-executed operation, where the first fingerprint template is The first fingerprints are matched, the second fingerprint template is matched with the second fingerprint, and the first fingerprint template is present in the fingerprint template set according to the first matching threshold and/or the When the second fingerprint template is used, it is determined that the verification is successful;
  • the target fingerprint includes a first fingerprint and a second fingerprint
  • the target security level is a second security level
  • the processing module 12 is specifically configured to: determine, according to the third matching threshold, whether a first fingerprint template and/or a second fingerprint template exists in the fingerprint template set corresponding to the to-be-executed operation, where the first fingerprint template is The first fingerprint is matched, the second fingerprint template is matched with the second fingerprint, and the first fingerprint template is present in the fingerprint template set according to the third matching threshold and/or the When the second fingerprint template is used, it is determined that the verification is successful.
  • the target security level is a second security level
  • the processing module 12 is specifically configured to:
  • the target fingerprint includes the first fingerprint
  • the target fingerprint includes a first fingerprint and a second fingerprint
  • the target security level is a third security level
  • the processing module 12 is specifically configured to: determine, according to the fourth matching threshold, whether a first fingerprint template and a second fingerprint template exist in the fingerprint template set corresponding to the to-be-executed operation, where the first fingerprint template is The first fingerprints match, and the second fingerprint template matches the second fingerprint;
  • the device 10 is applied to a device having a first fingerprint module and a second fingerprint module;
  • the processing module 12 is further configured to: determine that the fingerprint identification mode selected by the user is a dual fingerprint recognition mode, before the acquiring module 11 acquires the target fingerprint.
  • the device 10 for fingerprint recognition may correspond to the device for performing fingerprint recognition of the fingerprint recognition method according to an embodiment of the present application, and the above and other operations of the respective units in the device 10 for fingerprint recognition and/or
  • the functions of the respective methods in FIG. 1 to FIG. 15 are not described here.
  • FIG. 17 is a schematic block diagram of a device according to an embodiment of the present application.
  • the device 100 includes: a first fingerprint module 110, a second fingerprint module 120, and a processor 130.
  • the second fingerprint module 120 and the processor 130 can communicate with each other through an internal connection path.
  • the first fingerprint module 110 is configured to collect a first fingerprint
  • the second fingerprint module 120 is configured to acquire a second fingerprint
  • the processor 130 is configured to acquire a target fingerprint
  • the target fingerprint includes the The first fingerprint collected by the first fingerprint module 110 and/or the second fingerprint 120 collected by the second fingerprint module; the target fingerprint is verified according to the target security level corresponding to the operation to be performed, and the target security level is One of a plurality of security levels, the different security levels of the multiple security levels corresponding to different fingerprint verification modes; determining whether to perform the to-be-executed operation according to the verification result.
  • the processor 130 may refer to the device 10 corresponding to the embodiment of the present application. For brevity, details are not described herein again.
  • the first fingerprint module 110 is located at a front side of the device, and the second fingerprint module 120 is located at a back of the device; or the first fingerprint module 110 is located at a front of the device.
  • a second fingerprint module 120 is located on a second side opposite to the first side; or
  • the first fingerprint module 110 is located on the front or the back of the device, and the second fingerprint module 120 is located on one side of the device.
  • the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
  • each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software.
  • the processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA), or the like. Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory, and the processor reads the information in the memory and combines the hardware to complete the steps of the above method.
  • the device 100 of the embodiments of the present application may further include a memory, which may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read only memory (PROM), an erasable programmable read only memory (Erasable PROM, EPROM), or an electric Erase programmable read only memory (EEPROM) or flash memory.
  • the volatile memory can be a Random Access Memory (RAM) that acts as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • Synchronous DRAM synchronous dynamic random access memory
  • SDRAM Double Data Rate SDRAM
  • DDR SDRAM Double Data Rate SDRAM
  • ESDRAM Enhanced Synchronous Dynamic Random Access Memory
  • SLDRAM Synchronous Connection Dynamic Random Access Memory
  • DR RAM direct memory bus random access memory
  • the embodiment of the present application further provides a computer program product including instructions, when the computer runs the finger of the computer program product, the computer performs the fingerprint identification method of the foregoing method embodiment.
  • the computer program product can run on the device 100 described above.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the storage medium includes: a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.

Abstract

一种指纹识别的方法、装置和设备,该方法包括:根据待执行操作对应的目标安全等级,验证目标指纹,所述目标安全等级为多种安全等级中的一种,所述多种安全等级中不同的安全等级对应不同的指纹验证方式(S110);根据验证结果,确定是否执行所述待执行操作(S120)。上述指纹识别方法能够满足不同应用场景对指纹识别性能的要求。

Description

指纹识别的方法、装置和设备 技术领域
本申请实施例涉及生物识别技术领域,并且更具体地,涉及指纹识别的方法、装置和设备。
背景技术
随着手机的发展,手机的功能越来越强大,而指纹识别解锁,因其方便快捷的突出优势,逐渐取代数字密码,成为手机的主流解锁方式。指纹识别除了应用在手机解锁上,随着移动通信技术的兴起与发展,带来移动电子商务的兴起,手机成为非常便捷的交易终端,指纹识别技术也逐渐应用于手机支付等高安全要求的场景中。但不同的指纹识别应用场景对指纹识别性能(例如,拒真率、认假率)的要求会有所不同,现有相关技术中指纹识别的方法不能满足不同的应用场景对指纹识别性能的要求。
发明内容
本申请提供一种指纹识别的方法、装置和设备,能够满足不同应用场景(或者理解为不同操作)对指纹识别性能的要求。
第一方面,提供了一种指纹识别的方法,所述方法包括:根据待执行操作对应的目标安全等级,验证目标指纹,所述目标安全等级为多种安全等级中的一种,所述多种安全等级中不同的安全等级对应不同的指纹验证方式;根据验证结果,确定是否执行所述待执行操作。
根据本申请的指纹识别的方法,设备在获取到用户输入的指纹后,根据待执行操作(或者说指纹识别的当前应用场景)的安全等级,对获取到的指纹进行验证,由于不同的安全等级对应不同的指纹验证方式,不同的指纹验证方式会带来不同的指纹识别性能,能够满足不同应用场景对指纹识别性能的要求。
需要说明的是,本申请实施例的指纹识别的方法应用于具有至少一个指纹模组的设备,每个指纹模组在一次指纹识别过程中可以采集至少一个指纹。
在本申请实施例中,目标指纹包括第一指纹,或目标指纹包括第一指纹和第二指纹。
可选地,如果设备只包括一个指纹模组,且目标指纹包括第一指纹和第二指纹,则第一指纹和第二指纹为这一个指纹模组在本次指纹识别的过程中前后两次采集到的两个指纹。在这种情况下,指纹识别装置在指纹模组采集到第一指纹后,保存该第一指纹,待指纹识别装置采集到第二指纹后,根据待执行操作对应的目标安全等级,验证第一指纹和第二指纹。
可选地,如果设备只包括一个指纹模组,且目标指纹中仅包括第一指纹,则指纹识别装置在这个指纹模组采集到第一指纹后,根据待执行操作对应的目标安全等级,验证第一指纹。在这种情况下,第一指纹可以为一个指纹或多个指纹。
可选地,如果设备包括第一指纹模组和第二指纹模组,且目标指纹包括第一指纹和第二指纹,则第一指纹为由第一指纹模组采集到的一个指纹,第二指纹为由第二指纹模组采集到的一个指纹。指纹识别装置在第一指纹模组采集到第一指纹且第二指纹模组采集到第二指纹后,根据待执行操作对应的目标安全等级,验证所述第一指纹和所述第二指纹。
可选地,如果设备包括第一指纹模组和第二指纹模组,且目标指纹仅包括由第一指纹模组采集到的第一指纹或仅包括由第二指纹模组采集到的第二指纹,则指纹识别装置在第一指纹模组采集到第一指纹或第二指纹模组采集到第二指纹后,根据待执行操作对应的目标安全等级,验证第一指纹或第二指纹。在这种情况下,第一指纹可以为一个指纹或多个指纹,第二指纹可以为一个或多个指纹。
可以理解的是,本申请的指纹识别方法在应用于具有第一指纹模组和第二指纹模组的设备时,用户可以自由选择指纹识别模式是单指纹识别模式还是双指纹识别模式,能够增加手机指纹识别功能的易用性。进一步地,在用户选择双指纹识别模式并且通过第一指纹模组和第二指纹模组输入指纹时,设备会根据两个指纹模组采集到的指纹的综合验证结果作为最终的验证结果,提高指纹识别的安全性能。
结合第一方面,在第一方面的一种实现方式中,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第一安全等级;
其中,所述根据待执行操作对应的目标安全等级,验证目标指纹,包括:根据第一匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,其中,所述第一指纹模板与所述第一指纹 相匹配,所述第二指纹模板与所述第二指纹相匹配;在根据所述第一匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和/或所述第二指纹模板时,确定验证成功。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述根据待执行操作对应的目标安全等级,验证目标指纹,还包括:在根据所述第一匹配阈值确定所述指纹模板集合中不存在所述第一指纹模板和所述第二指纹模板时,根据第二匹配阈值确定所述指纹模板集合中是否存在所述第一指纹模板和所述第二指纹模板,所述第二匹配阈值小于所述第一匹配阈值;在根据所述第二匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和所述第二指纹模板时,确定验证成功。
可选的,第一匹配阈值和/或第二匹配阈值为预设值,本申请对第一匹配阈值和第二匹配阈值不作限定。
因此,本申请的指纹识别的方法,对于安全等级为第一安全等级的待执行操作,在根据预设匹配条件验证第一指纹和第二指纹失败的情况下,降低匹配条件后进行进一步验证,如果在降低匹配条件后验证成功,则认为验证成功。由此,能够提高指纹识别的正确率。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第二安全等级;
其中,所述根据待执行操作的目标安全等级,验证目标指纹,包括:根据第三匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;在根据所述第三匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和/或所述第二指纹模板时,确定验证成功。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述目标安全等级为第二安全等级;
其中,所述根据待执行操作的目标安全等级,验证目标指纹,包括:在所述目标指纹包括第一指纹时,根据第三匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板,所述第一指纹模板与所述第一指纹相匹配;在根据所述第三匹配阈值确定所述指纹模板集合中存在所述第一指纹模板时,确定验证成功。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第三安全等级;
其中,所述根据待执行操作对应的目标安全等级,验证目标指纹,包括:根据第四匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;在根据所述第四匹配阈值确定所述指纹模板集合中存在所述第一指纹模块和所述第二指纹模板时,确定验证成功。
需要说明的是,本申请实施例中,第三匹配阈值与第一匹配阈值可以相同也可以不同,第四匹配阈值与第一匹配阈值可以相同也可以不同,并且第三匹配阈值与第四匹配阈值可以相同也可以不同。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述方法应用于具有第一指纹模组和第二指纹模组的设备;其中,在根据待执行操作对应的目标安全等级,验证目标指纹之前,所述方法还包括:确定用户选择的指纹识别模式为双指纹识别模式。
可选地,上述的指纹模板集合为存储在设备内的用户数据,是事先开启指纹识别功能时注册或预留的指纹数据,作为指纹验证的模板。在一些具体的实施方式中,设备将指纹模板集合同步存储在云端,当设备丢失了本地存储的指纹数据时,可以通过网络从云端获取指纹数据,并存储在本地。
可选地,当用户选择的指纹识别模式为双指纹识别模式时,执行第一方面及其上述实现方式中的指纹识别的方法。当用户选择的指纹识别模式为单指纹识别模式时,执行与现有技术中相同的指纹识别方法。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述方法还包括:在用户选择双指纹识别模式时,通过第一指纹模组采集第一指纹,并通过第二指纹模组采集第二指纹;其中,所述第一指纹模组和所述第二指纹模组为配置在同一电子设备的两个不同的指纹模组,且所述第一指纹和所述第二指纹分别为所述第一指纹模组和所述第二指纹模组采集到的用户不同手指的指纹。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述根据待执行操作对应的目标安全等级,验证目标指纹,包括:判断待执行操作所对应的目标安全等级,所述目标安全等级为预先设置的第一安全等级、 第二安全等级和第三安全等级中的一个;根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,其中,不同的安全等级对应于不同的指纹验证方式。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:在所述目标安全等级为第一安全等级时,采用第一匹配条件并判断是否存在于所述第一指纹和所述第二指纹分别相匹配的注册指纹模板;在所述第一匹配条件下,所述第一指纹和所述第二指纹中至少一个匹配成功时,指纹验证通过。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,还包括:在所述第一指纹和所述第二指纹均匹配失败时,采用第二匹配条件并重新判断是否存在与所述第一指纹和所述第二指纹分别相匹配的注册指纹模板,其中所述第二匹配条件低于所述第一匹配条件;在所述第二匹配条件下,所述第一指纹和所述第二指纹均匹配成功时,指纹验证通过。
结合第一方面及其上述实现方式中,在第一方面的另一实现方式中,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:在所述目标安全等级为第二安全等级时,采用第三匹配条件并判断是否存在与所述第一指纹或所述第二指纹相匹配的注册指纹模板;若所述第一指纹或所述第二指纹匹配成功,指纹验证通过。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:在所述目标安全等级为第二安全等级时,采用第三匹配条件并判断是否存在与所述第一指纹和所述第二指纹相匹配的注册指纹模板;若所述第一指纹或所述第二指纹并非均匹配失败,指纹验证通过。
结合第一方面及其上述实现方式,在第一方面的另一实现方式中,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:在所述目标安全等级为第三安全等级时,采用第四匹配条件并判断是否存在与所述第一指纹和所述第二指纹相匹配的注册指纹模板;在所述第一指纹和所述第二指纹均匹配成功时,指纹验证通过; 否则,指纹验证不通过。
第二方面,提供了一种装置,用于执行上述第一方面或第一方面的任意可能的实现方式中的方法。具体地,所述装置包括用于执行上述第一方面或第一方面的任意可能的实现方式中的方法的功能模块。
第三方面,提供了一种设备,包括至少一个指纹模组、处理器和存储器。所述处理器、所述存储器、所述至少一个指纹模组之间通过内部连接通路互相通信,传递控制和/或数据信号,使得所述设备执行上述第一方面或第一方面的任意可能的实现方式中的方法。
第四方面,提供了一种计算机可读介质,用于存储计算机程序,所述计算机程序包括用于执行上述第一方面或第一方面的任意可能的实现方式中的指令。
第五方面,提供了一种包括指令的计算机程序产品,当计算机运行所述计算机程序产品的所述指时,所述计算机执行上述第一方面或第一方面的任意可能的实现方式中的指纹识别的方法。具体地,该计算机程序产品可以运行于上述第三方面的设备上。
附图说明
图1是根据本申请实施例的指纹识别的方法的示意性流程图。
图2是根据本申请实施例的通过位于设备两侧的两个指纹模组采集指纹的方法的示意图。
图3是根据本申请实施例的通过位于设备侧面的单个指纹模组采集指纹的方法的示意图。
图4是根据本申请另一实施例的通过位于设备侧面的单个指纹模组采集指纹的方法的示意图。
图5是根据本申请实施例的位于设备正面和背面的两个指纹模组采集指纹的方法的示意图。
图6是根据本申请实施例的通过位于设备正面的一个指纹模组采集指纹的方法的示意图。
图7是根据本申请实施例的通过位于设备背面的一个指纹模组采集指纹的方法的示意图。
图8是根据本申请实施例的通过分别位于设备的正面和侧面的两个指纹 模组采集指纹的方法的示意图。
图9是根据本申请另一实施例的通过分别位于设备的正面和侧面的两个指纹模组采集指纹的方法的示意图。
图10是根据本申请实施例的通过分别位于设备的背面和侧面的两个指纹模组采集指纹的方法的示意图。
图11是根据本申请另一实施例的通过分别位于设备的背面和侧面的两个指纹模组采集指纹的方法的示意图。
图12是根据本申请一具体实施例的指纹识别的方法的示意性流程图。
图13是根据本申请另一具体实施例的指纹识别的方法的示意性流程图。
图14是根据本申请再一具体实施例的指纹识别的方法的示意性流程图。
图15是根据本申请再一具体实施例的指纹识别的方法的示意性流程图。
图16是根据本申请实施例的指纹识别的装置的示意性框图。
图17是根据本申请实施例的设备的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。
应理解,本申请实施例中的指纹识别的装置可以为指纹识别芯片。本申请实施例中的设备可以为手机、平板电脑、笔记本电脑等安装有指纹识别芯片的电子设备。应理解,本申请实施例中的指纹识别芯片可以为按压式指纹识别芯片、刮擦式指纹识别芯片或触摸式指纹识别芯片。
下面将结合附图详细描述根据本申请实施例的指纹识别的方法。需要说明的是,在描述具体实施例时,以设备包括第一指纹模组和第二指纹模组,每个指纹模组在一次指纹识别过程中只采集一个指纹为例,仅仅是为了描述方便,而不对本申请的保护范围构成限定。
图1示出了根据本申请实施例的指纹识别的方法100,方法100可以由指纹识别的装置执行。如图1所示,方法100包括:
S110,根据待执行操作对应的目标安全等级,验证目标指纹,所述目标安全等级为多种安全等级中的一种,所述多种安全等级中不同的安全等级对应不同的指纹验证方式;
S120,根据验证结果,确定是否执行所述待执行操作。
本申请实施例中,在获取到用户输入的指纹后,根据待执行操作的安全等级,对获取到的指纹进行验证,由于不同的安全等级对应不同的指纹验证方式,不同的指纹验证方式会带来不同的指纹识别性能,能够满足不同应用场景对指纹识别性能的要求。
在本申请实施例中,可选地,预先设置两种指纹识别模式,分别为单指纹识别模式和双指纹识别模式,用户可以通过设置选择指纹识别模式。当用户选择指纹识别模式为单指纹识别模式时,可以只激活第一指纹识别模块,或只激活第二指纹识别模块。当用户选择双指纹识别模式时,激活第一指纹识别模块和第二指纹识别模块。并且需要说明的是,在双指纹识别模式下,用户可以通过第一指纹识别模块输入第一指纹,且通过第二指纹识别模块输入第二指纹,用户还可以选择只通过第一指纹识别模块输入第一指纹,或者只通过第二指纹识别模块输入第二指纹。
例如,如图2所示出的,第一指纹模组位于设备的左侧,第二指纹模组位于设备的右侧。如果用户选择的指纹识别模式为双指纹识别模式,用户可以同时通过第一指纹模组和第二指纹模组输入同一个手的不同手指的指纹,单手即可以完整指纹识别,操作方便。或者如图3所示出的,用户可以仅选择第一指纹模组输入一个手指的指纹,或者如图4所示出的,用户可以仅选择第二指纹模组输入一个手指的指纹。
或者,如图5所示出的,第一指纹模组位于设备的正面,第二指纹模组位于设备的背面。可选地,第一指纹模组可以作为设备的起始(Home)键,以减少设备正面上的按键的数量。在图5所示的情况下,如果用户选择的指纹识别模式为双指纹识别模式,用户可以同时通过第一指纹模组和第二指纹模组输入同一个手的不同手指的指纹。或者如图6所示出的,用户可以仅选择第一指纹模组输入一个手指的指纹,或者如图7所示出的,用户可以仅选择第二指纹模组输入一个手指的指纹。
或者,如图8和图9所示出的,第一指纹模组位于设备的正面,第二指纹模组位于设备的侧面,如果用户选择的指纹识别模式为双指纹识别模式,用户可以通过第一指纹模组和第二指纹模组输入同一个手的不同手指的指纹或者不同手的指纹。或者用户可以仅选择第一指纹模组输入一个手指的指纹,或者用户可以仅选择第二指纹模组输入一个手指的指纹。
或者,如图10和图11所示出的,第一指纹模组位于设备的背面,第二 指纹模组位于设备的侧面,如果用户选择的指纹识别模式为双指纹识别模式,用户可以通过第一指纹模组和第二指纹模组输入同一个手的不同手指的指纹或者不同手的指纹。或者用户可以仅选择第一指纹模组输入一个手指的指纹,或者用户可以仅选择第二指纹模组输入一个手指的指纹。
在本申请实施例中,可选地,在指纹识别的装置中预先设置有操作与安全等级的第一对应关系,以及安全等级与指纹验证方式的第二对应关系。在获取到目标指纹后,根据第一对应关系确定与待执行操作对应的目标安全等级,之后根据第二对应关系确定与目标安全等级对应的指纹验证方式。安全等级的高低对应于操作对指纹识别性能的要求的高低。以安全等级包括三种安全等级,等级由低到高分别为安全等级I(低安全等级)、安全等级II(中等安全等级)和安全等级III(高安全等级),操作包括屏幕解锁、应用解锁、指纹注册、指纹支付和数据解锁为例,第一对应关系可以具有表1示出的形式。并且以指纹验证方式包括指纹验证方式I、指纹验证方式II和指纹验证方式III为例,第二对应关系可以具有表2示出的形式。
表1
Figure PCTCN2017088721-appb-000001
表2
安全等级 指纹验证方式
安全等级I 指纹验证方式I
安全等级II 指纹验证方式II
安全等级III 指纹验证方式III
在本申请实施例中,可选地,用户可以实际需要自行设置操作与安全等级的第一对应关系,以及安全等级与指纹验证方式的第二对应关系。
具体地,在S120中,当验证结果为验证成功时,确定执行所述待执行操作。当验证结果为验证失败时,确定不执行所述待执行操作。
可选地,在一些实施例中,当用户选择的指纹识别模式为双指纹识别模式时,执行方法100的指纹识别方法。在这种情况下,当用户选择的指纹识 别模式为单指纹识别模式,采用与相关技术中的指纹识别方法。
图12示出了根据本申请一具体实施例的指纹识别的方法200,方法200中待执行操作对应的安全等级为第一安全等级(可选地,对应上述安全等级I),用户选择的指纹识别模式为双指纹识别模式。如图12所示,方法200包括:
S210,第一指纹模组采集第一指纹,第二指纹模组采集第二指纹;
S220,确定第一指纹与注册指纹模板是否匹配,确定第二指纹与注册指纹模板是否匹配;
可以理解的是,对应不同的操作的注册指纹模板可以不同。例如,对应屏幕解锁的注册指纹模板包括右手拇指的指纹和右手食指的指纹,而对应指纹支付的注册指纹模板包括右手拇指的指纹和右手中指的指纹。所以S220中的注册指纹模板指的是与待执行操作对应的注册指纹模板。
在S220中,可选地,确定第一指纹与注册指纹模板是否匹配的操作由与第一指纹模组对应的第一处理模块执行,确定第二指纹与注册指纹模板是否匹配的操作由与第二指纹模组对应的第二处理模块执行。第一处理模块和第二处理模块独立运行,相对于现有技术中的单个指纹模组和单个处理模块进行指纹识别的方法,能够在不增加指纹识别的时间的基础上,提高指纹识别的结果的可靠性。
可选地,作为一个例子,在S220中,第一处理模块提取第一指纹的特征点,然后计算第一指纹的特征点与注册指纹模板的特征点的相似度,如果相似度大于或等于第一匹配阈值,则认为第一指纹匹配成功,否则匹配失败。第二处理模块提取第二指纹的特征点,然后计算第二指纹的特征点与注册指纹模板的特征点的相似度,如果相似度大于或等于第一匹配阈值,则认为第二指纹匹配成功,否则匹配失败。
需要说明的是,通过计算细节点的相似度判断指纹匹配是否成功仅仅是一个示例。本申请实施例中,指纹匹配的方法可以为现有相关技术中的任一方法,本申请对此不作限定。
S230,确定第一指纹和第二指纹是否均匹配失败;
S240,如果S230的结果为是,降低匹配条件,之后确定第一指纹与注册指纹模板是否匹配,确定第二指纹与注册指纹模板是否匹配;
可选地,这里的降低匹配条件指的是降低匹配阈值。具体地,如果S230 的结果为是,则第一处理模块根据第二匹配阈值判断第一指纹是否匹配成功,第二处理模块根据第二匹配阈值判断第二指纹是否匹配成功。第二匹配阈值小于第一匹配阈值。并且第一匹配阈值和第二匹配阈值的取值可以是预先设置的值,也可以是用户根据需要自行设置的值。
可选地,如果S230的结果为否,也就是说如果第一指纹和第二指纹均匹配成功,或者第一指纹和第二指纹中有一个匹配成功,则直接执行待执行操作。
S250,确定第一指纹和第二指纹是否均匹配成功;
S260,如果S250的结果为是,执行待执行操作。
可选地,如果S250的结果为否,说明第一指纹和第二指纹至少有一个匹配失败,则结束指纹识别流程。
图13示出了根据本申请另一具体实施例的指纹识别的方法300,方法300中待执行操作对应的安全等级为第二安全等级(可选地,对应上述安全等级II),用户选择的指纹识别模式为单指纹识别模式,或者用户选择双指纹识别模式但只通过一个指纹模组输入指纹。如图13所示,方法300包括:
S310,通过第一指纹模组采集第一指纹,或通过第二指纹模组采集第二指纹;
S320,确定第一指纹与注册指纹模板是否匹配,或确定第二指纹与注册指纹模板是否匹配;
S330,确定第一指纹是否匹配成功或第二指纹是否匹配成功;
S340,如果S330的结果为是,执行待执行操作;
可选地,如果S330的结果为否,结束指纹识别流程。
可选地,在方法300中,可以事先进行如下设置:在双指纹识别模式下,如果第一指纹模组和第二指纹模组采集到指纹的时间差小于或等于预设时间差,则认为用户此次通过第一指纹模组和第二指纹模组输入两个指纹;如果第一指纹模组和第二指纹模组采集到指纹的时间差大于所述预设时间差,则认为用户此次仅通过先采集到指纹的指纹模组输入一个指纹。或者如果第一指纹模组和第二指纹模组中的一个指纹模组在采集到用户输入的指纹后,经过所述预设时间差,所述第一指纹模组和所述第二指纹模组中的另一个未采集到用户输入的指纹,则认为用户此次仅通过第一指纹模组和第二指纹模组中采集到指纹的指纹模组输入一个指纹。
图14示出了根据本申请再一具体实施例的指纹识别的方法400,方法400中待执行操作对应的安全等级为第二安全等级(可选地,对应上述安全等级II),用户选择的指纹识别模式为双指纹识别模式。如图14所示,方法400包括:
S410,第一指纹模组采集第一指纹,第二指纹模组采集第二指纹;
S420,确定第一指纹与注册指纹模板是否匹配,确定第二指纹与注册指纹模板是否匹配;
S430,确定第一指纹和第二指纹是否均匹配失败;
S440,如果S430的结果为否,执行待执行操作。
可选地,如果S430的结果为是,则结束指纹识别流程。
图15示出了根据本申请再一具体实施例的指纹识别的方法500,方法500中待执行操作对应的安全等级为第三安全等级(可选地,对应上述安全等级III),用户选择的指纹识别模式为双指纹识别模式。如图15所示,方法500包括:
S510,第一指纹模组采集第一指纹,第二指纹模组采集第二指纹;
S520,确定第一指纹与注册指纹模板是否匹配,确定第二指纹与注册指纹模板是否匹配;
S530,确定第一指纹和第二指纹是否均匹配成功;
S540,如果S530的结果为是,执行待执行操作,之后结束指纹识别流程。
可选地,如果S530的结果为否,结束指纹识别流程。
需要说明的是,方法300-500中指纹匹配的方法与方法200中相同,为了避免重复,适当省略相关描述。并且,可以理解的是,方法300、方法400和方法500中进行指纹匹配时采用的匹配阈值可以相同,也可以不同。例如,方法300和方法400中可以采用第三匹配阈值,方法500中可以采用第四匹配阈值。本申请对第三匹配阈值和第四匹配阈值的取值也同样不作限定。
以上结合图1至图15详细描述了根据本申请实施例的指纹识别的方法。下面将结合图16详细描述根据本申请实施例的指纹识别的装置10,所述装置10包括:
获取模块11,用于获取目标指纹;
处理模块12,用于根据待执行操作对应的目标安全等级,验证所述目标 指纹,所述目标安全等级为多种安全等级中的一种,所述多种安全等级中不同的安全等级对应不同的指纹验证方式;
所述处理模块13,还用于根据验证结果,确定是否执行所述待执行操作。
因此,根据本申请实施例的指纹识别的装置,在获取到用户输入的指纹后,根据待执行操作的安全等级,对获取到的指纹进行验证,由于不同的安全等级对应不同的指纹验证方式,不同的指纹验证方式会带来不同的指纹识别性能,能够满足不同应用场景对指纹识别性能的要求。
在本申请实施例中,可选地,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第一安全等级;
其中,所述处理模块12具体用于:根据第一匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配,在根据所述第一匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和/或所述第二指纹模板时,确定验证成功;
在根据所述第一匹配阈值确定所述指纹模板集合中不存在所述第一指纹模板和所述第二指纹模板时,根据第二匹配阈值确定所述指纹模板集合中是否存在所述第一指纹模板和所述第二指纹模板,所述第二匹配阈值小于所述第一匹配阈值,在根据所述第二匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和所述第二指纹模板时,确定验证成功。
在本申请实施例中,可选地,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第二安全等级;
其中,所述处理模块12具体用于:根据第三匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;在根据所述第三匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和/或所述第二指纹模板时,确定验证成功。
在本申请实施例中,可选地,所述目标安全等级为第二安全等级;
其中,所述处理模块12具体用于:
在所述目标指纹包括第一指纹时,根据第三匹配阈值确定与所属待执行操作对应的指纹模板集合中是否存在第一指纹模板,所述第一指纹模板与所述第一指纹相匹配;在根据所述第三匹配阈值确定所述指纹模板集合中存在 所述第一指纹模板时,确定验证成功。
在本申请实施例中,可选地,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第三安全等级;
其中,所述处理模块12具体用于:根据第四匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;
在根据所述第四匹配阈值确定所述指纹模板集合中存在所述第一指纹模块和所述第二指纹模板时,确定验证成功。
在本申请实施例中,可选地,所述装置10应用于具有第一指纹模组和第二指纹模组的设备;
其中,在所述获取模块11获取目标指纹之前,所述处理模块12还用于:确定用户选择的指纹识别模式为双指纹识别模式。
应理解,根据本申请实施例的指纹识别的装置10可对应于根据本申请实施例的执行指纹识别方法的指纹识别的装置,并且指纹识别的装置10中的各个单元的上述和其它操作和/或功能分别为了实现图1至图15中的各个方法的相应流程,为了简洁,在此不再赘述。
图17示出了根据本申请实施例的设备的示意性框图,如图17所示,设备100包括:第一指纹模组110、第二指纹模组120和处理器130,第一指纹模组110、第二指纹模组120和处理器130可以通过内部连接通路互相通信。其中,所述第一指纹模组110用于采集第一指纹,所述第二指纹模组120用于采集第二指纹,所述处理器130用于获取目标指纹,所述目标指纹包括所述第一指纹模组110采集到的第一指纹和/或第二指纹模组采集到的第二指纹120;根据待执行操作对应的目标安全等级,验证所述目标指纹,所述目标安全等级为多种安全等级中的一种,所述多种安全等级中不同的安全等级对应不同的指纹验证方式;根据验证结果,确定是否执行所述待执行操作。
根据本申请实施例的处理器130可以参照对应本申请实施例的装置10,为了简洁,在此不再赘述。
可选地,所述第一指纹模组110位于所述设备的正面,所述第二指纹模组120位于所述设备的背面;或,所述第一指纹模组110位于所述设备的第一侧面,所述第二指纹模组120位于与所述第一侧面相对的第二侧面;或者,
所述第一指纹模组110位于所述设备的正面或背面,所述第二指纹模组120位于所述设备的其中一个侧面。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例的设备100还可以包括存储器,存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供一种包括指令的计算机程序产品,当计算机运行所述计算机程序产品的所述指时,所述计算机执行上述方法实施例的指纹识别的方法。具体地,该计算机程序产品可以运行于上述设备100上。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前 述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (22)

  1. 一种指纹识别的方法,其特征在于,所述方法包括:
    根据待执行操作对应的目标安全等级,验证目标指纹,所述目标安全等级为多种安全等级中的一种,所述多种安全等级中不同的安全等级对应不同的指纹验证方式;
    根据验证结果,确定是否执行所述待执行操作。
  2. 根据权利要求1所述的方法,其特征在于,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第一安全等级;
    其中,所述根据待执行操作对应的目标安全等级,验证目标指纹,包括:
    根据第一匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,其中,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;
    在根据所述第一匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和/或所述第二指纹模板时,确定验证成功。
  3. 根据权利要求2所述的方法,其特征在于,所述根据待执行操作对应的目标安全等级,验证目标指纹,还包括:
    在根据所述第一匹配阈值确定所述指纹模板集合中不存在所述第一指纹模板和所述第二指纹模板时,根据第二匹配阈值确定所述指纹模板集合中是否存在所述第一指纹模板和所述第二指纹模板,所述第二匹配阈值小于所述第一匹配阈值,
    在根据所述第二匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和所述第二指纹模板时,确定验证成功。
  4. 根据权利要求1所述的方法,其特征在于,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第二安全等级;
    其中,所述根据待执行操作的目标安全等级,验证目标指纹,包括:
    根据第三匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;
    在根据所述第三匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和/或所述第二指纹模板时,确定验证成功。
  5. 根据权利要求1所述的方法,其特征在于,所述目标安全等级为第 二安全等级;
    其中,所述根据待执行操作的目标安全等级,验证目标指纹,包括:
    在所述目标指纹包括第一指纹时,根据第三匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板,所述第一指纹模板与所述第一指纹相匹配;
    在根据所述第三匹配阈值确定所述指纹模板集合中存在所述第一指纹模板时,确定验证成功。
  6. 根据权利要求1所述的方法,其特征在于,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第三安全等级;
    其中,所述根据待执行操作对应的目标安全等级,验证目标指纹,包括:
    根据第四匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;
    在根据所述第四匹配阈值确定所述指纹模板集合中存在所述第一指纹模块和所述第二指纹模板时,确定验证成功。
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,应用于具有第一指纹模组和第二指纹模组的设备;
    其中,在根据待执行操作对应的目标安全等级,验证目标指纹之前,所述方法还包括:
    确定用户选择的指纹识别模式为双指纹识别模式。
  8. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在用户选择双指纹识别模式时,通过第一指纹模组采集第一指纹,并通过第二指纹模组采集第二指纹;
    其中,所述第一指纹模组和所述第二指纹模组为配置在同一电子设备的两个不同的指纹模组,且所述第一指纹和所述第二指纹分别为所述第一指纹模组和所述第二指纹模组采集到的用户不同手指的指纹。
  9. 根据权利要求8所述的方法,其特征在于,所述根据待执行操作对应的目标安全等级,验证目标指纹,包括:
    判断待执行操作所对应的目标安全等级,所述目标安全等级为预先设置的第一安全等级、第二安全等级和第三安全等级中的一个;
    根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和 所述第二指纹进行验证,其中,不同的安全等级对应于不同的指纹验证方式。
  10. 根据权利要求9所述的方法,其特征在于,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:
    在所述目标安全等级为第一安全等级时,采用第一匹配条件并判断是否存在与所述第一指纹和所述第二指纹分别相匹配的注册指纹模板;
    在所述第一匹配条件下,所述第一指纹和所述第二指纹中至少一个匹配成功时,指纹验证通过。
  11. 根据权利要求10所述的方法,其特征在于,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,还包括:
    在所述第一指纹和所述第二指纹均匹配失败时,采用第二匹配条件并重新判断是否存在与所述第一指纹和所述第二指纹分别相匹配的注册指纹模板,其中所述第二匹配条件低于所述第一匹配条件;
    在所述第二匹配条件下,所述第一指纹和所述第二指纹均匹配成功时,指纹验证通过。
  12. 根据权利要求9至11中任一项所述的方法,其特征在于,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:
    在所述目标安全等级为第二安全等级时,采用第三匹配条件并判断是否存在与所述第一指纹或所述第二指纹相匹配的注册指纹模板;
    若所述第一指纹或所述第二指纹匹配成功,指纹验证通过。
  13. 根据权利要求9至11中任一项所述的方法,其特征在于,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:
    在所述目标安全等级为第二安全等级时,采用第三匹配条件并判断是否存在与所述第一指纹和所述第二指纹相匹配的注册指纹模板;
    若所述第一指纹或所述第二指纹并非均匹配失败,指纹验证通过。
  14. 根据权利要求9至13中任一项所述的方法,其特征在于,所述根据所述目标安全等级,采用相对应的指纹验证方式对所述第一指纹和所述第二指纹进行验证,包括:
    在所述目标安全等级为第三安全等级时,采用第四匹配条件并判断是否存在与所述第一指纹和所述第二指纹相匹配的注册指纹模板;
    在所述第一指纹和所述第二指纹均匹配成功时,指纹验证通过;否则,指纹验证不通过。
  15. 一种指纹识别的装置,其特征在于,包括:
    获取模块,用于获取目标指纹;
    处理模块,用于根据待执行操作对应的目标安全等级,验证所述目标指纹,所述目标安全等级为多种安全等级中的一种,所述多种安全等级中不同的安全等级对应不同的指纹验证方式;
    所述处理模块,还用于根据验证结果,确定是否执行所述待执行操作。
  16. 根据权利要求15所述的装置,其特征在于,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第一安全等级;
    其中,所述处理模块具体用于:
    根据第一匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配,
    在根据所述第一匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和/或所述第二指纹模板时,确定验证成功;
    在根据所述第一匹配阈值确定所述指纹模板集合中不存在所述第一指纹模板和所述第二指纹模板时,根据第二匹配阈值确定所述指纹模板集合中是否存在所述第一指纹模板和所述第二指纹模板,所述第二匹配阈值小于所述第一匹配阈值;
    在根据所述第二匹配阈值确定所述指纹模板集合中存在所述第一指纹模板和所述第二指纹模板时,确定验证成功。
  17. 根据权利要求15所述的装置,其特征在于,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第二安全等级;
    其中,所述处理模块具体用于:
    根据第三匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和/或第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;
    在根据所述第三匹配阈值确定所述指纹模板集合中存在所述第一指纹 模板和/或所述第二指纹模板时,确定验证成功。
  18. 根据权利要求15所述的装置,其特征在于,所述目标安全等级为第二安全等级;
    其中,所述处理模块具体用于:
    在所述目标指纹包括第一指纹时,根据第三匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板,所述第一指纹模板与所述第一指纹相匹配;
    在根据所述第三匹配阈值确定所述指纹模板集合中存在所述第一指纹模板时,确定验证成功。
  19. 根据权利要求15所述的装置,其特征在于,所述目标指纹包括第一指纹和第二指纹,所述目标安全等级为第三安全等级;
    其中,所述处理模块具体用于:
    根据第四匹配阈值确定与所述待执行操作对应的指纹模板集合中是否存在第一指纹模板和第二指纹模板,所述第一指纹模板与所述第一指纹相匹配,所述第二指纹模板与所述第二指纹相匹配;
    在根据所述第四匹配阈值确定所述指纹模板集合中存在所述第一指纹模块和所述第二指纹模板时,确定验证成功。
  20. 根据权利要求15至19中任一项所述的装置,其特征在于,应用于具有第一指纹模组和第二指纹模组的设备,在所述获取模块获取目标指纹之前,所述处理模块还用于:
    确定用户选择的指纹识别模式为双指纹识别模式。
  21. 一种设备,其特征在于,包括至少一个指纹模组和权利要求15至20中任一项所述的装置,其中,所述至少一个指纹模组用于采集目标指纹。
  22. 根据权利要求21所述的设备,其特征在于,所述至少一个指纹模组包括第一指纹模组和第二指纹模组,
    其中,所述第一指纹模组位于所述设备的正面,所述第二指纹模组位于所述设备的背面;或,
    所述第一指纹模组位于所述设备的第一侧面,所述第二指纹模组位于与所述第一侧面相对的第二侧面;或者,
    所述第一指纹模组位于所述设备的正面或背面,所述第二指纹模组位于所述设备的其中一个侧面。
PCT/CN2017/088721 2017-06-16 2017-06-16 指纹识别的方法、装置和设备 WO2018227584A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/088721 WO2018227584A1 (zh) 2017-06-16 2017-06-16 指纹识别的方法、装置和设备
CN201780000478.6A CN107438847A (zh) 2017-06-16 2017-06-16 指纹识别的方法、装置和设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/088721 WO2018227584A1 (zh) 2017-06-16 2017-06-16 指纹识别的方法、装置和设备

Publications (1)

Publication Number Publication Date
WO2018227584A1 true WO2018227584A1 (zh) 2018-12-20

Family

ID=60462033

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/088721 WO2018227584A1 (zh) 2017-06-16 2017-06-16 指纹识别的方法、装置和设备

Country Status (2)

Country Link
CN (1) CN107438847A (zh)
WO (1) WO2018227584A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108563938A (zh) * 2018-04-20 2018-09-21 青岛海信移动通信技术股份有限公司 移动终端的指纹验证方法及装置
CN109409044A (zh) * 2018-09-19 2019-03-01 维沃移动通信有限公司 一种验证界面显示方法及终端
CN109416738A (zh) * 2018-09-25 2019-03-01 深圳市汇顶科技股份有限公司 基于多传感器的屏下指纹认证方法、系统和电子设备
CN114499994A (zh) * 2021-12-30 2022-05-13 科大讯飞股份有限公司 设备指纹的识别方法、装置、电子设备及介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156709A (zh) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 指纹识别检测组件、终端设备及指纹验证方法
CN204028944U (zh) * 2014-08-26 2014-12-17 南昌欧菲生物识别技术有限公司 指纹识别检测组件及终端设备
CN104331653A (zh) * 2014-10-20 2015-02-04 深圳市汇顶科技股份有限公司 指纹解密方法及装置
CN104615927A (zh) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 多系统安全验证方法、多系统安全验证装置和终端
CN105279400A (zh) * 2014-12-22 2016-01-27 东莞市步步高通信软件有限公司 移动终端安全管理方法及移动终端
CN106534560A (zh) * 2016-11-25 2017-03-22 努比亚技术有限公司 移动终端控制装置及方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959317A (zh) * 2016-07-11 2016-09-21 深圳市金立通信设备有限公司 一种安全认证方法及终端
CN106228054A (zh) * 2016-08-02 2016-12-14 北京小米移动软件有限公司 身份验证方法和装置
CN106446838A (zh) * 2016-09-28 2017-02-22 乐视控股(北京)有限公司 一种指纹识别方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156709A (zh) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 指纹识别检测组件、终端设备及指纹验证方法
CN204028944U (zh) * 2014-08-26 2014-12-17 南昌欧菲生物识别技术有限公司 指纹识别检测组件及终端设备
CN104331653A (zh) * 2014-10-20 2015-02-04 深圳市汇顶科技股份有限公司 指纹解密方法及装置
CN105279400A (zh) * 2014-12-22 2016-01-27 东莞市步步高通信软件有限公司 移动终端安全管理方法及移动终端
CN104615927A (zh) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 多系统安全验证方法、多系统安全验证装置和终端
CN106534560A (zh) * 2016-11-25 2017-03-22 努比亚技术有限公司 移动终端控制装置及方法

Also Published As

Publication number Publication date
CN107438847A (zh) 2017-12-05

Similar Documents

Publication Publication Date Title
CN106326829B (zh) 检测虚假指纹的方法和设备以及识别指纹的方法和设备
US10509943B2 (en) Method of processing fingerprint information
WO2017080311A1 (zh) 指纹模板完善方法、装置和终端设备
WO2018227584A1 (zh) 指纹识别的方法、装置和设备
WO2018129966A1 (zh) 指纹处理方法、装置及移动终端
WO2019127897A1 (zh) 一种自学习声纹识别的更新方法和装置
US11824642B2 (en) Systems and methods for provisioning biometric image templates to devices for use in user authentication
JP2017530457A (ja) アイデンティティ認証方法ならびに装置、端末及びサーバ
JP2017524998A (ja) 本人照合を行うための方法およびシステム
CN104683302A (zh) 认证方法、认证装置、终端设备、认证服务器及系统
US9483682B1 (en) Fingerprint recognition method and device thereof
US10552596B2 (en) Biometric authentication
CN104050406A (zh) 利用指纹组合进行鉴权的方法及终端设备
US10089349B2 (en) Method and electronic device for updating the registered fingerprint datasets of fingerprint recognition
CN105678147B (zh) 触控操作的方法和装置
WO2017080289A1 (zh) 指纹注册方法、装置及移动终端
US20160234024A1 (en) Leveraging Multiple Biometrics For Enabling User Access To Security Metadata
KR20180012882A (ko) 지문 인증 방법 및 장치
US11552944B2 (en) Server, method for controlling server, and terminal device
CN106940802B (zh) 用于使用生物测量学信息的认证的方法和设备
JP2019527868A (ja) 生体的特徴識別装置及び方法、並びに生体的特徴テンプレートの登録方法
WO2018161312A1 (zh) 指纹识别的方法及装置
SE1650416A1 (en) Secure storage of fingerprint related elements
EP2495687A1 (en) Method of matching, biometric matching apparatus, and computer program
Beton et al. Biometric secret path for mobile user authentication: A preliminary study

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17913381

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17913381

Country of ref document: EP

Kind code of ref document: A1