WO2019041243A1 - Procédé de vérification de fonction de capteur d'empreinte digitale et terminal - Google Patents

Procédé de vérification de fonction de capteur d'empreinte digitale et terminal Download PDF

Info

Publication number
WO2019041243A1
WO2019041243A1 PCT/CN2017/099966 CN2017099966W WO2019041243A1 WO 2019041243 A1 WO2019041243 A1 WO 2019041243A1 CN 2017099966 W CN2017099966 W CN 2017099966W WO 2019041243 A1 WO2019041243 A1 WO 2019041243A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint sensor
fingerprint
information
matching
threshold
Prior art date
Application number
PCT/CN2017/099966
Other languages
English (en)
Chinese (zh)
Inventor
高伟强
崔闯
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/099966 priority Critical patent/WO2019041243A1/fr
Priority to CN201780064703.2A priority patent/CN109844764B/zh
Publication of WO2019041243A1 publication Critical patent/WO2019041243A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition

Definitions

  • the present invention relates to the field of fingerprint verification, and in particular, to a method and a terminal for verifying a function of a fingerprint sensor.
  • the user may cause dead pixels in the fingerprint due to static electricity, bumps, drops, etc., when the user enters a new fingerprint template or unlocks the terminal to update the template, the bad area
  • the image will be entered or updated to the verification template. Since the image of the dead zone is fixed, when the unlocked fingerprint is used, the image of the bad spot area is matched as the fingerprint feature point. When the feature point of the bad spot area is enough, it is bad. When the feature information represented by the point is sufficient, the feature information is used as a normal fingerprint feature for verification and identification, and an uninputted fingerprint may also unlock the terminal, which seriously affects the user's information security.
  • whether the fingerprint module is disabled is determined by whether the dead pixel on the fingerprint sensor exceeds the allowable range. For example, in the range of the dead point, the bad point area is shielded by updating the template or verifying the match. Verify the valid fingerprint area; if the dead point is outside the allowable range, directly disable the fingerprint module.
  • the above operation algorithm is complicated, and various functions of the fingerprint are not separately set in the module abnormality, and the function is not determined. After the fingerprint module has a problem, various uncontrollable problems are caused, and once the dead point occurs. The fingerprint module is directly disabled beyond the allowable range.
  • the function of the fingerprint module is not only applied to the field of identity recognition such as fingerprint unlocking and secure payment, but also can recognize single-click, long-press, slide and other operations, and can be more enriched with related programs.
  • Applications When a certain function of the fingerprint is affected, some functions can be used normally. If all the functions of the module are disabled, a certain amount of resources will be wasted.
  • the embodiment of the invention provides a method for verifying the function of a fingerprint sensor and a terminal.
  • the technical problem to be solved is that when the dead point on the fingerprint sensor exceeds the allowable range, an illegal unlocking operation may occur, and if the direct unlocking is adopted, The fingerprint module reduces the illegal unlocking operation, which causes all the functions of the fingerprint sensor to fail at the same time, resulting in waste of resources.
  • the present invention provides a method for verifying the function of a fingerprint sensor.
  • the method for verifying the function of the fingerprint sensor includes: the finger touches the fingerprint sensor, and the terminal collects fingerprint information of the finger, and the fingerprint information of the finger includes the fingerprint. If the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information of the collected finger and the stored fingerprint template, and the matching threshold is based on the dead point information of the fingerprint sensor and the fingerprint sensor.
  • the information determines that the bad point information includes the number of dead pixels and the dead point position, and the information of the fingerprint sensor includes the size and the pixel of the fingerprint sensor; and according to the matching degree and the matching threshold, the verification result is determined.
  • the fingerprint is matched and the matching degree is calculated.
  • the verification result is determined according to the matching degree and the matching threshold.
  • the set security threshold is used to reduce the illegal unlocking problem. The probability of being born.
  • the method further comprises: adjusting the matching threshold according to the number of dead pixels and the dead point position, the dead point information including the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the method further includes: determining a matching threshold according to the number of dead pixels and the dead point position; wherein the dead point information includes the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the step of determining the verification result specifically includes: if the matching degree is greater than or equal to the matching threshold, the identity verification function of the fingerprint sensor is successfully verified; if the matching degree is less than the matching threshold , the fingerprint sensor's identity class verification function verification failed.
  • the identity class verification function is verified by discriminating the matching degree and the matching threshold. When the matching degree does not satisfy the matching threshold, the identity class verification function fails to be verified.
  • the identity verification function of the fingerprint sensor if the matching threshold does not meet the preset security threshold, the identity verification function of the fingerprint sensor is disabled.
  • the fingerprint sensor function adopts different discriminating conditions.
  • the discriminating condition of the identity class verification function is that the matching threshold satisfies the preset safety threshold value, and the fingerprint sensor's dead point exceeds the allowable range, and the fingerprint sensor is directly disabled. Operation, reducing waste of resources.
  • the verification method of the fingerprint sensor function further includes: if the number of dead pixels in the area of the operation function of the fingerprint sensor exceeds a preset number, the operation function of the fingerprint sensor is disabled.
  • the operation class function is discriminated. If the number of dead pixels located in the operation function area of the fingerprint sensor exceeds the preset number, the operation class function is disabled, instead of disabling all functions of the fingerprint sensor, thereby reducing resource waste.
  • an embodiment of the present invention provides a terminal, where the terminal includes: an acquisition unit, a calculation unit, and a determination unit.
  • the collecting unit is configured to collect fingerprint information of the finger, and the fingerprint information of the finger includes dead point information of the fingerprint sensor; when the matching threshold meets a preset safety threshold, the calculating unit according to the finger
  • the fingerprint information and the stored fingerprint template are used to calculate a matching degree; wherein the matching threshold is determined according to the dead point information of the fingerprint sensor and the information of the fingerprint sensor, the information of the fingerprint sensor includes the size and the pixel of the fingerprint sensor; and the determining unit is configured to The matching degree and the matching threshold determine the verification result.
  • the computing unit when the matching threshold meets the security threshold, the computing unit performs a matching operation on the fingerprint, and calculates a matching degree.
  • the determining unit determines the verification result according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • the method further comprises: adjusting the matching threshold according to the number of dead pixels and the dead point position, the dead point information including the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the determining unit is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity verification function of the fingerprint sensor is successfully verified; if the matching degree is less than the matching threshold, the fingerprint sensor is The verification of the class verification function failed.
  • the identity class verification function is verified by discriminating the matching degree and the matching threshold. When the matching degree does not satisfy the matching threshold, the identity class verification function verification fails.
  • the determining unit is further configured to disable the identity class verification function of the fingerprint sensor if the matching threshold does not satisfy the preset security threshold.
  • the fingerprint sensor function adopts different discriminating conditions.
  • the discriminating condition of the identity class verification function is that the matching threshold satisfies the preset safety threshold value, and the fingerprint sensor's dead point exceeds the allowable range, and the fingerprint sensor is directly disabled. Operation, thereby reducing resource waste.
  • the determining unit is further configured to disable the operation function of the fingerprint sensor if the number of dead pixels in the area of the operation function of the fingerprint sensor exceeds a preset number.
  • the operation class function is discriminated. If the number of dead pixels located in the operation function area of the fingerprint sensor exceeds the preset number, the operation class function is disabled, instead of disabling all functions of the fingerprint sensor, thereby reducing resource waste.
  • an embodiment of the present invention provides a terminal, where the terminal includes: a processor and a memory. a memory for storing program instructions; a processor, configured to perform the following steps according to the program instructions stored in the memory; if the terminal detects that the finger of the user touches the fingerprint sensor, collecting fingerprint information of the finger, where the fingerprint information includes a bad sensor Point information, and when the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information of the finger and the stored fingerprint template, and then the verification result is judged according to the matching degree and the matching threshold; wherein the matching threshold is based on the fingerprint sensor The dead point information and the information of the fingerprint sensor determine that the information of the fingerprint sensor includes the size and pixel of the fingerprint sensor.
  • the processor when the matching threshold meets the security threshold, the processor performs a matching operation on the fingerprint to calculate a matching degree.
  • the verification result is determined according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • the method further comprises: adjusting the matching threshold according to the number of dead pixels and the dead point position, the dead point information including the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the processor is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity verification function of the fingerprint sensor is successfully verified; if the matching degree is less than the matching threshold, the identity verification function of the fingerprint sensor is verified. failure.
  • the identity class verification function is verified by discriminating the matching degree and the matching threshold. When the matching degree does not satisfy the matching threshold, the identity class verification function fails to be verified.
  • the processor is further configured to disable the identity class verification function of the fingerprint sensor if the matching threshold does not satisfy the preset security threshold.
  • the fingerprint sensor function adopts different discriminating conditions.
  • the discriminating condition of the identity class verification function is that the matching threshold satisfies the preset safety threshold value, and the fingerprint sensor's dead point exceeds the allowable range, and the fingerprint sensor is directly disabled. Operation, reducing waste of resources.
  • the processor is further configured to disable the operation function of the fingerprint sensor if the number of dead pixels in the area of the operation function of the fingerprint sensor exceeds a preset number.
  • the operation class function is discriminated. If the number of dead pixels located in the operation function area of the fingerprint sensor exceeds the preset number, the operation class function is disabled, instead of disabling all functions of the fingerprint sensor, thereby reducing resource waste.
  • Embodiments of the present invention provide a computer program product comprising instructions for performing a verification method or step of the fingerprint sensor function when the instruction is run on a computer.
  • Embodiments of the present invention provide a computer readable storage medium for storing instructions when the instructions are in the The verification method or step of the above fingerprint sensor function is executed when executed on a computer.
  • the method and the terminal for verifying the function of the fingerprint sensor provided by the embodiment of the present invention, by setting the matching threshold and the security threshold, perform the fingerprint matching operation when the matching threshold meets the security threshold, and calculate the matching degree.
  • the probability of occurrence of the illegal unlocking problem is reduced, and when the fingerprint sensor is abnormal, the functions of the fingerprint sensor are respectively determined, which can effectively improve the utilization of the fingerprint sensor and reduce resource consumption.
  • FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a method for verifying a fingerprint sensor function according to an embodiment of the present invention
  • 3 is a common type of fingerprint detail features in a fingerprint sensor function verification method according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a method for dynamically adjusting a matching threshold according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • the terminal includes, but is not limited to, a mobile phone, a smart door lock, a smart wearable, and the like.
  • FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the terminal 100 includes: a radio frequency (RF) circuit 110, a memory 120, an input unit 130, a display unit 140, an audio circuit 150, a processor 160, and a wireless local area network (WLAN).
  • RF radio frequency
  • Module 170, power supply 180, and Bluetooth module 190 and the like It will be understood by those skilled in the art that the terminal structure shown in FIG. 1 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
  • the RF circuit 110 can be used to send and receive information, for example, to connect to a mobile broadband.
  • RF circuit 110 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • the RF circuit 110 can also forward the mobile bandwidth service to the WLAN module 170 to forward the mobile bandwidth service to other terminals through the WLAN module 170.
  • wireless communication can adopt any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), and code division multiple access (Code).
  • CDMA Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • E-mail Short Messaging Service
  • the memory 120 can be used to store program instructions, and the processor 160 causes the terminal to perform the methods as shown in Figures 2 and 4 by running program instructions stored in the memory 120.
  • the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system and an application required to implement a verification method of the fingerprint sensor function, and the like.
  • the storage data area can store list information of the terminal and data generated by the terminal when performing the verification method of the fingerprint sensor function.
  • the memory 120 may include a volatile memory such as a random-access memory (RAM); the memory 120 may also include a non-volatile memory, such as only Read-only memory (ROM), flash memory, hard disk drive (HDD) or solid-state drive (SSD).
  • the memory 120 may also include a combination of the above types of memory.
  • the input unit 130 can be configured to receive digital or character information input by the user, including turning on a WLAN hotspot command, selecting an instruction of a terminal sharing the WLAN hotspot, and the like.
  • the input unit 130 may include a touch panel 131 and other input devices 132.
  • the touch panel 131 also referred to as a touch screen, can collect touch operations on or near the user (such as a user using a finger, a stylus, or the like on the touch panel 131 or near the touch panel 131. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 631 can include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 160 is provided and can receive commands from the processor 160 and execute them.
  • the input unit 130 can implement the touch panel 131 by using various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 130 may also include other input devices 132.
  • other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 140 can be used to display information input by the user or information provided to the user as well as various menus of the terminal.
  • the display unit 140 may include a display screen 141.
  • the display screen 141 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 131 can cover the display screen 141. When the touch panel 131 detects a touch operation on or near the touch panel 131, the touch panel 131 transmits to the processor 160 to determine the type of the touch event, and then the processor 160 according to the touch event. The type provides a corresponding visual output on display 141.
  • the touch panel 131 and the display screen 141 function as two separate components to implement input and input functions of the terminal, in some embodiments, the touch panel 131 may be integrated with the display screen 141. Realize the input and output functions of the terminal.
  • the audio circuit 150, the speaker 151, and the microphone 152 can provide an audio interface between the user and the terminal 100.
  • the audio circuit 150 can transmit the converted electrical data of the received audio data to the speaker 151 for conversion to the sound signal output by the speaker 151; on the other hand, the microphone 152 converts the collected sound signal into an electrical signal by the audio circuit 150. After receiving, it is converted into audio data, and then processed by the audio data output processor 160, transmitted to the terminal, for example, via the RF circuit 110, or outputted to the memory 120 for further processing.
  • the processor 160 is the control center of the terminal, which connects various parts of the entire terminal using various interfaces and lines, and executes by executing or executing software programs and/or modules stored in the memory 120, and calling data stored in the memory 120.
  • processor 160 may include one or more processing units.
  • the processor 160 can integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, etc., and the modem processor mainly processes wireless communication. It will be appreciated that the above described modem processor may also not be integrated into the processor 160.
  • the WLAN module 170 can be used to assist users in sending and receiving emails, browsing web pages, and accessing streaming media, etc., which provides users with wireless broadband WLAN Internet access.
  • the WLAN is a short-range wireless transmission technology, and the terminal can access the WLAN hotspot through the WLAN module 170, and the WLAN hotspot can be turned on by the WLAN module 170 to forward the mobile bandwidth service to other terminals.
  • the WLAN module 170 can also perform Wi-Fi broadcast and scanning to enable wireless communication with other nearby terminals.
  • the terminal also includes a power source 180 (such as a battery) that supplies power to the various components.
  • a power source can be logically coupled to the processor 160 through the power management system to manage functions such as charging, discharging, and power consumption through the power management system.
  • the Bluetooth module 190 can be a Bluetooth Low Energy (BLE) device, a traditional Bluetooth device, or a dual-mode Bluetooth device supporting traditional Bluetooth and BLE.
  • BLE Bluetooth Low Energy
  • the Bluetooth module 190 establishes a BLE or classic Bluetooth connection with the Bluetooth modules of other terminals, and the Bluetooth module 190 can also perform BR or BLE broadcast and scanning to achieve wireless communication with other surrounding terminals.
  • the terminal may further include a camera, a speaker, etc., and details are not described herein again.
  • the terminal includes a processor 160 and a memory 120 for storing program instructions.
  • the processor 160 is configured to perform the following operations according to the program instructions stored in the memory 120: if the terminal detects the user's When the finger touches the fingerprint sensor, the fingerprint information of the finger is collected, and the fingerprint information includes the bad point information of the fingerprint sensor.
  • the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information and the stored fingerprint template. Based on the matching degree and the matching threshold, the verification result is determined.
  • the matching threshold is determined according to the dead point information of the fingerprint sensor and the information of the fingerprint sensor, and the information of the fingerprint sensor includes the size and the pixel of the fingerprint sensor.
  • the processor 160 is further configured to: adjust a matching threshold according to the dead point information, where the dead point information includes a number of dead points and a dead point position.
  • the processor 160 is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity class verification function is successfully verified; if the matching degree is less than the matching threshold, the identity class verification function fails to be verified. .
  • the processor 160 is further configured to disable the identity class verification function if the matching threshold does not meet the preset security threshold.
  • the processor 160 is further configured to disable the operation class function if the area of the operation function of the fingerprint sensor is damaged.
  • the processor when the matching threshold meets the security threshold, the processor performs a matching operation on the fingerprint and calculates a matching degree. The processor then determines the verification result based on the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • FIG. 2 is a flowchart of a method for verifying a fingerprint sensor according to an embodiment of the present invention. As shown in FIG. 2, the method for verifying the fingerprint sensor includes:
  • Step S201 If it is detected that the finger touches the fingerprint sensor, the fingerprint sensor collects the fingerprint information of the finger, wherein the fingerprint information of the finger includes the bad point information of the fingerprint sensor.
  • the fingerprint sensor When the user enters the fingerprint on the terminal for the first time, the fingerprint sensor will fingerprint the user's finger placed on the surface of the fingerprint sensor, and usually enters it several times until the terminal reminds the entry. Before entering the fingerprint, you need to enter the setting fingerprint interface of the terminal. The user needs to create a digital password or a mixed password. When the fingerprint sensor fails to verify the fingerprint, the user can use the set password to unlock.
  • the fingerprint sensor and the HOME button can be combined into one function button on the terminal, or they can be set separately.
  • the fingerprint sensor and the HOME key are combined into one function key, which can be disposed directly under the terminal display unit 140, and the appearance presented on the terminal can be a circle or a rectangle with four corners being curved.
  • the HOME button is generally disposed directly below the display screen 141, and can be a physical button.
  • the fingerprint sensor can be disposed on the front, back, and side of the terminal, and the front of the terminal is provided with a display. On this side of the screen 141, the fingerprint sensor can be a physical function button, and the physical fingerprint sensor can be combined with the power button to form a function button, or can be set on the back of the terminal. If the fingerprint sensor is not a physical function button, it can be set on the display screen. 141.
  • the fingerprint information of the fingerprint sensor is mainly used to extract the feature of the fingerprint image.
  • Feature extraction is the core algorithm in the process of fingerprint identification and identification.
  • the task of feature extraction algorithm is to detect the number of feature points in the fingerprint image and the type of each feature point, the location of the feature points and the direction of the line in the region where the feature points are located.
  • Feature point types include singular points and minutiae points.
  • the accuracy and accuracy of the extraction of singular points and minutiae points determine the performance of the fingerprint recognition system, that is, the recognition rate.
  • the point of detail refers to the mutation of the fingerprint ridge.
  • the common ones are mainly the types shown in Figure 3.
  • Statistical experiments show that the endpoint and the bifurcation point are the most common details in the fingerprint.
  • the fingerprint information of the finger is collected, including determining the position of the endpoint and the bifurcation point, and then determining whether the fingerprint matches by comparing the mutual relationship between the feature points.
  • the fingerprint of the finger is mainly taken as an example for description.
  • any information that can be used to extract similar fingerprint feature information is information that can effectively represent the user's identity, and can be replaced, and will not be described here.
  • the fingerprint information of the collected finger may be implemented by any other method in the prior art, and details are not described herein.
  • the dead point information of the fingerprint sensor can be collected by downloading two fingerprint sensor images of different configurations, wherein the configuration described herein is a parameter configuration of the signal conditioning circuit in the fingerprint sensor, and signal conditioning
  • the parameters of the circuit include offset and gain.
  • the configuration of the signal conditioning circuit is different.
  • the gray level of each point of the acquired image of the fingerprint sensor is also different; if all the points of the same position in the two fingerprint sensor images are compared, if compared If the gradation difference of the point is abnormal, the point is considered to be a dead point.
  • the number of the dead pixels in the fingerprint sensor is not limited thereto, and may be implemented in other manners in the prior art, and details are not described herein.
  • the method for verifying the fingerprint sensor provided by the embodiment of the present invention is to perform corresponding operations on the terminal through the fingerprint after the terminal has entered the fingerprint.
  • Step S202 If the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information of the finger and the stored fingerprint template; wherein the matching threshold is determined according to the dead point information of the fingerprint sensor and the information of the fingerprint sensor.
  • the matching threshold may be dynamically adjusted according to the dead point information, wherein the dead point information includes a number of dead points and a dead point position, and the fingerprint sensor information includes: a size, a resolution, and at least a pixel of the sensor.
  • the matching threshold may be appropriately increased according to the bad point information of the fingerprint sensor, that is, the matching success difficulty is increased.
  • the matching threshold is 50%.
  • the user can unlock the terminal with the fingerprint of the already entered finger, and it is easy to achieve 50% matching, and the unlocking succeeds; but the fingerprint is not unlocked with the fingerprint that is not entered. It is difficult to achieve a 50% match and the unlock fails.
  • the probability of illegal unlocking is increased regardless of whether the finger fingerprint or the unfinished finger fingerprint is used to unlock the terminal.
  • the bad point information is not the texture feature of the fingerprint itself, but the bad point information is included in the correct fingerprint information, and has a great influence on the matching result in the fingerprint matching process. If the unfinished finger print is used to unlock the terminal, the degree of matching may easily exceed 50%, and there is a risk of illegal unlocking. Therefore, when there is a dead pixel in the fingerprint sensor, the matching threshold may be appropriately increased to reduce the risk of illegal unlocking. For example, when a bad point appears on the fingerprint sensor, the matching threshold of 50% needs to be adjusted according to the bad point information of the collected fingerprint sensor.
  • the adjusted matching threshold can be, for example, 60%. Re-adjusted matching threshold and number of dead pixels, dead pixels on the fingerprint sensor Related to, when the number of dead pixels is fixed, the matching threshold is determined by the position of the dead point on the fingerprint sensor. If the endpoint, the intersection, etc. at the dead point are image processed to form the feature information of the fingerprint image, the matching threshold will be 50. % is adjusted based on more.
  • an adjustment period may be set to adjust the matching threshold according to the collected fingerprint information.
  • the matching threshold may be adjusted at the end of an adjustment period, and the bad point information of the fingerprint sensor is collected in an adjustment period. At the end of the one adjustment period, according to the badness of the fingerprint sensor that has been collected in the one adjustment period.
  • the point information adjusts the original matching threshold, and the original matching threshold can be considered to be fixed during the one adjustment period.
  • a security threshold is set for the matching threshold, and the fingerprint verification can be started only if the matching threshold meets the requirement of the preset security threshold.
  • the security threshold is used to indicate that the matching threshold is below the security threshold, and the fingerprint sensor usually does not illegally unlock.
  • the template calculates the matching degree to calculate the matching degree; the matching threshold value can be obtained by adjusting the original matching threshold value in the adjustment period according to the dead point information of the fingerprint sensor collected in the previous adjustment period.
  • the matching threshold satisfies the security threshold value, which means that the endpoints, intersections, and the like at the dead point of the fingerprint sensor do not form a fingerprint image after image processing, and the number of dead pixels on the fingerprint sensor does not exceed the allowable range. If the current matching threshold exceeds the security threshold, it is considered that the illegal unlocking of the fingerprint is uncontrollable. In this case, the unlocking function of the fingerprint can be directly disabled. When the fingerprint unlock function is disabled, you can unlock it by entering a character password.
  • the matching threshold does not meet the security threshold and includes the following cases:
  • the number of dead pixels on the fingerprint sensor exceeds the preset number; because the number of dead pixels exceeds the preset number, the matching threshold adjusted according to the number of dead pixels can no longer meet the security threshold, and the security threshold can be preset. The number of bad points in the number is determined.
  • the second case the endpoints, intersections, etc. of the dead pixels on the fingerprint sensor form image information of the fingerprint image after image processing, and the feature information is superimposed on the normal fingerprint image to form new feature information, and the matching is adjusted according to the feature information. Threshold, the adjusted matching threshold does not meet the security threshold.
  • the adjustment period can be dynamically changed. For example, in the initial stage of the use of the fingerprint sensor, the fingerprint sensor is newer at this time, and the possibility of occurrence of a dead pixel is slightly smaller, and the adjustment period can be set to be extremely long; in the later stage of use of the fingerprint sensor, as the use time of the fingerprint sensor is extended, The possibility of a dead pixel appearing on the fingerprint sensor increases, and at this time, the adjustment period can be shortened.
  • the mechanism for triggering the detection of the bad point information of the fingerprint sensor includes operations not limited to timing, power on/off, fingerprint unlocking, fingerprint touch, etc., and the ambient light sensor, the proximity light sensor, the acceleration sensor, and the like, Various sensors such as gyroscopes and Hall devices are comprehensively judged to find the best dead point detection opportunity and obtain more accurate fingerprint dead point information, so as to make a more accurate judgment on the fingerprint state.
  • Step S203 Determine the verification result according to the matching degree and the matching threshold.
  • the verification is successful if the matching degree is greater than or equal to the matching threshold.
  • the verification fails.
  • the function of the fingerprint sensor may include an identity class verification function and an operation class function
  • the identity class verification function may include, for example, a fingerprint unlocking, a fingerprint payment, and the like, which need to match the fingerprint
  • the operation function for example, may Including long press, single double click, slide, take photos, answer calls, etc. does not require fingerprint matching.
  • the terminal instructs the user to re-press the fingerprint sensor, and then performs steps S201-S203 again. If the verification fails repeatedly, the terminal locks, and the user presses the fingerprint sensor at this time, and the terminal does not execute. Steps S201-S203, but remind the user to input a preset number or character password for unlocking.
  • the division of the function of the fingerprint sensor may not be classified according to the above classification, and may be classified according to similar operations, and will not be described herein.
  • step S201 to step S203 are verifications of the identity class verification function.
  • step S203 if the matching degree is greater than or equal to the matching threshold, the identity class verification function is successfully verified; if the matching degree is less than the matching threshold, the identity class verification function is verified. failure.
  • the operation class function can also be verified. Operation class verification identifies the user's operation through a specific area or module set on the fingerprint sensor. If the specific area or module can recognize the user's operation, the operation class function is normal; if the user's operation cannot be effectively recognized, Disable the operation class function.
  • Operational function verification includes the following methods:
  • a specific area is set on the fingerprint sensor, and only the area where the fingerprint sensor is divided is determined, and the specific area is an operation for recognizing the sliding, clicking, and the like of the finger fingerprint, and when the damage occurs in the specific area, the influence is affected. Operational functions such as sliding click of a fingerprint. If the area outside the specific area is damaged, it will not affect the operation function of the fingerprint.
  • the second way using the image acquisition module, assumes that the user performs a sliding operation, and can continuously collect multiple frames of images through the image acquisition module, and compare the acquired multi-frame images, thereby determining the direction of the sliding operation by the time and position of the image.
  • the algorithm can determine that the operation class function is abnormal, so the operation function can be verified by the image acquisition module.
  • the third way is to integrate a capacitor plate in the sensor module area of the fingerprint module, and the capacitor plate is used for recognizing the pressing of the finger.
  • the operation such as pressing can be identified according to the signal change of the capacitor plate, and the operation function can be verified by whether the signal of the capacitor plate is abnormal.
  • the operation function can be verified. If the operation function verification fails, the area for identifying the sliding, clicking, and the like of the finger fingerprint is damaged. At this time, the identity verification function is retained. The operation class function is disabled; if the operation function verification is successful, that is, the area for recognizing the sliding, clicking, etc. of the finger fingerprint is intact, the identity class verification function and the operation class function are normal.
  • the operation class function can be verified. If the operation class function verification fails, that is, the area for identifying the sliding, clicking, etc. of the finger fingerprint is damaged, the identity class verification function and the operation class function are disabled. If the operation function verification is successful, that is, the area for recognizing the sliding, clicking, etc. of the finger fingerprint is intact, the disabling identity class verification function retains the operation class function.
  • the verification of the identity class verification function and the operation class function is performed before and after, and can be performed simultaneously. It is also possible to perform verification of the operation class function and then verify the identity class verification function.
  • the embodiment of the invention provides a method for verifying the function of the fingerprint sensor.
  • the matching threshold meets the security threshold, the matching operation is performed on the fingerprint, and the matching degree is calculated.
  • the verification result is determined according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • FIG. 4 is a flowchart of a method for dynamically adjusting a matching threshold according to an embodiment of the present invention. As shown in FIG. 4, the method for dynamically adjusting the matching threshold may include the following steps:
  • Step 401 Collect finger information of the finger and detect the number of bad points and the position of the dead point of the fingerprint sensor.
  • step S401 when the user touches the finger with the fingerprint sensor, the fingerprint information of the fingerprint is collected.
  • the fingerprint information includes the bad point information of the fingerprint sensor, and the bad point information of the fingerprint sensor may be stored first to be used for reference when adjusting the matching threshold.
  • the fingerprint information of the finger is collected, and the feature information of the fingerprint image of the finger is extracted.
  • the feature information of the fingerprint image of the finger is extracted.
  • Step S402 If the dead point information of the fingerprint sensor is detected, the matching threshold is recalculated according to the dead point information of the fingerprint sensor.
  • Step S403 Determine whether the matching threshold meets the security threshold.
  • step S404 is performed to perform matching verification on the collected fingerprint information and the stored fingerprint template to calculate a matching degree.
  • step 411 is performed.
  • Step S405 It is determined whether the matching degree is greater than or equal to the matching threshold. When the matching degree is less than the matching threshold, step S406 is performed; when the matching degree is greater than or equal to the matching threshold, step S407 is performed.
  • Step S406 The verification fails.
  • Step S407 The verification is successful.
  • Step S408 Determine whether the operation class function is affected. If it does not affect, step S410 is performed; if it is affected, step S409 is performed.
  • Step S409 Disable the operation class function and retain other functions that are not affected.
  • Step S410 The identity class verification function and the operation class function are normal.
  • Step S411 Disable fingerprint identity class function verification.
  • Step S412 Determine whether the operation class function is affected. If it does not affect, step S413 is performed; if it is affected, step S414 is performed.
  • Step S413 Disable the authentication function and retain other functions that are not affected.
  • Step S414 The fingerprint is invalid.
  • Step S408 Disable the identity class verification function.
  • the matching threshold is updated according to the number of dead pixels and the dead point position of the fingerprint sensor, thereby reducing the probability of occurrence of the illegal unlocking problem.
  • FIG. 5 is a schematic structural diagram of another terminal according to an embodiment of the present invention. As shown in FIG. 5, the terminal may include: an acquisition unit 501, a calculation unit 502, and a determination unit 503.
  • the collecting unit 501 is configured to collect finger information of the user's finger by placing a finger on the fingerprint sensor, and the fingerprint information includes dead point information of the fingerprint sensor.
  • the collecting unit 501 is configured to collect fingerprint information of the user's finger, where the fingerprint information includes a bad letter of the fingerprint sensor.
  • the information is the same as described in the above step S201, and therefore will not be described again.
  • the calculating unit 502 is configured to: if the matching threshold meets the preset security threshold, calculate a matching degree according to the fingerprint information of the finger and the stored fingerprint template; wherein the matching threshold is based on the dead point information of the fingerprint sensor and the information of the fingerprint sensor It is determined that the information of the fingerprint sensor includes the size and pixel of the fingerprint sensor.
  • the calculating unit 502 is further configured to: adjust a matching threshold according to the dead point information, where the dead point information includes a number of dead points and a dead point position.
  • the calculation unit 502 is configured to adjust the matching threshold at the end of the adjustment period, which is the same as described in the above step S202, and therefore will not be described again.
  • the determining unit 503 is configured to determine a verification result according to the matching degree and the matching threshold.
  • the verification succeeds if the matching degree is greater than or equal to the matching threshold, that is, the matching degree is greater than or equal to the matching threshold.
  • the verification fails.
  • the function of the fingerprint sensor may include an identity class verification function and an operation class function
  • the identity class verification function may include, for example, a fingerprint unlocking, a fingerprint payment, and the like, which need to match the fingerprint
  • the operation function for example, may Including long press, single double click, slide, take photos, answer calls, etc. does not require fingerprint matching.
  • the division of the function of the fingerprint sensor may not be classified according to the above classification, and may be classified according to similar operations, and will not be described herein.
  • the determining unit 503 is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity class verification function fails to be verified, and the identity class verification function needs to be disabled; if the matching degree is less than the matching threshold, the identity class verification function fails.
  • the determining unit 503 can also be used to verify the operation class function.
  • the operation function does not need to perform fingerprint matching. It only needs to determine the area where the fingerprint sensor is divided. This area is used to recognize the sliding, clicking, etc. of the finger fingerprint. When the damage occurs in the area, it will affect the sliding click of the fingerprint. Class function. If the area outside the area is damaged, it will not affect the operation function of the fingerprint.
  • the determining unit 503 is configured to verify the identity class function and the operation class function, and the process and manner of the verification are the same as those described in step S203, and thus are not described herein.
  • the computing unit when the matching threshold meets the security threshold, the computing unit performs a matching operation on the fingerprint, and calculates a matching degree.
  • the determining unit determines the verification result according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • Embodiments of the present invention provide a computer program product comprising instructions that, when executed on a computer, perform the methods or steps of Figures 2 and 4 above.
  • Embodiments of the present invention provide a computer readable storage medium for storing instructions that, when executed on a computer, perform the methods or steps of FIGS. 2 and 4 above.
  • a software functional unit If implemented in the form of a software functional unit and sold or used as a standalone product, it can be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application, in essence or the contribution to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium. Including a number of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform the present application. All or part of the steps of the method described in the examples.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

Selon les modes de réalisation, la présente invention concerne un procédé de vérification d'une fonction d'un capteur d'empreinte digitale et un terminal, le procédé consistant à : collecter des informations d'empreinte digitale d'un doigt s'il est détecté que le doigt touche un capteur d'empreinte digitale, les informations d'empreinte digitale du doigt comprenant des informations de point défectueux du capteur d'empreinte digitale; calculer un degré de correspondance en fonction des informations d'empreinte digitale du doigt et d'un modèle d'empreinte digitale stocké si un seuil de correspondance satisfait un seuil de sécurité prédéfini; et déterminer un résultat de vérification en fonction du degré de correspondance et du seuil de correspondance, le seuil de correspondance étant déterminé en fonction des informations de point défectueux du capteur d'empreinte digitale et des informations du capteur d'empreinte digitale, et les informations du capteur d'empreinte digitale comprenant la taille et les pixels du capteur d'empreinte digitale. Dans les modes de réalisation de la présente invention, des conditions pour une fonction d'un capteur d'empreinte digitale sont définies et déterminées respectivement, résolvant ainsi le problème de toutes les fonctions du capteur d'empreinte digitale qui sont désactivées lorsque les points défectueux du capteur d'empreinte digitale dépassent une certaine plage.
PCT/CN2017/099966 2017-08-31 2017-08-31 Procédé de vérification de fonction de capteur d'empreinte digitale et terminal WO2019041243A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/099966 WO2019041243A1 (fr) 2017-08-31 2017-08-31 Procédé de vérification de fonction de capteur d'empreinte digitale et terminal
CN201780064703.2A CN109844764B (zh) 2017-08-31 2017-08-31 指纹传感器功能的验证方法及终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/099966 WO2019041243A1 (fr) 2017-08-31 2017-08-31 Procédé de vérification de fonction de capteur d'empreinte digitale et terminal

Publications (1)

Publication Number Publication Date
WO2019041243A1 true WO2019041243A1 (fr) 2019-03-07

Family

ID=65524868

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/099966 WO2019041243A1 (fr) 2017-08-31 2017-08-31 Procédé de vérification de fonction de capteur d'empreinte digitale et terminal

Country Status (2)

Country Link
CN (1) CN109844764B (fr)
WO (1) WO2019041243A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472393A (zh) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 基于生物识别的信息显示方法、装置、存储介质和设备
CN111947702A (zh) * 2020-07-16 2020-11-17 中广核核电运营有限公司 传感器交叉验证故障诊断方法、装置、计算机设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112382229A (zh) * 2019-07-29 2021-02-19 浙江宇视科技有限公司 Led显示屏的控制方法、装置、设备及存储介质
CN112560645A (zh) * 2020-12-11 2021-03-26 维沃移动通信有限公司 状态控制方法、装置和电子设备
CN114212050A (zh) * 2021-12-15 2022-03-22 深圳市致知行科技有限公司 一种基于电容式感应实现车门解锁的控制方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7126631B1 (en) * 1999-06-30 2006-10-24 Intel Corporation Sensing with defective cell detection
CN105469083A (zh) * 2015-11-13 2016-04-06 广东欧珀移动通信有限公司 指纹图像处理方法、装置和终端设备
CN105809133A (zh) * 2016-03-08 2016-07-27 广东欧珀移动通信有限公司 指纹特征信息更新方法及装置
CN105991997A (zh) * 2015-03-06 2016-10-05 成都方程式电子有限公司 一种电容式图像传感器坏点实时定位的方法

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101032863B1 (ko) * 2009-07-01 2011-05-06 주식회사 슈프리마 복수의 지문센서를 구비한 지문인증장치 및 방법
US9442833B1 (en) * 2010-07-20 2016-09-13 Qualcomm Incorporated Managing device identity
CN103745148B (zh) * 2014-01-26 2017-06-27 广东欧珀移动通信有限公司 一种基于指纹识别的信息保护方法及移动终端
CN105227307A (zh) * 2014-06-03 2016-01-06 阿里巴巴集团控股有限公司 身份验证方法与系统以及服务器数据处理方法和服务器
CN105608357A (zh) * 2015-07-30 2016-05-25 宇龙计算机通信科技(深圳)有限公司 指纹验证方法、指纹验证装置和终端
CN106709399B (zh) * 2015-08-21 2021-02-09 小米科技有限责任公司 指纹识别方法及装置
CN105138132A (zh) * 2015-08-31 2015-12-09 宇龙计算机通信科技(深圳)有限公司 基于指纹识别的触控方法、装置及终端
CN105468955A (zh) * 2015-12-28 2016-04-06 深圳市亚略特生物识别科技有限公司 基于生物识别的移动终端及电子系统
CN106934320B (zh) * 2015-12-29 2020-03-17 小米科技有限责任公司 指纹识别方法及装置
CN105786577A (zh) * 2016-03-22 2016-07-20 上海斐讯数据通信技术有限公司 指纹移动终端快速拍照的方法、装置及指纹移动终端
CN105956553B (zh) * 2016-04-28 2019-12-06 Oppo广东移动通信有限公司 一种解锁方法及移动终端
CN106096539B (zh) * 2016-06-07 2018-03-27 广东欧珀移动通信有限公司 一种进行生物识别的方法及终端
CN106201066B (zh) * 2016-06-24 2019-02-12 Oppo广东移动通信有限公司 信息的验证方法、装置及终端
CN106201022B (zh) * 2016-06-24 2019-01-15 维沃移动通信有限公司 一种移动终端的处理方法及移动终端
CN106681552A (zh) * 2016-11-18 2017-05-17 乐视控股(北京)有限公司 控制车载系统的方法、装置和车载系统及其控制方法、装置
CN106909893B (zh) * 2017-02-09 2020-12-29 北京小米移动软件有限公司 指纹识别方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7126631B1 (en) * 1999-06-30 2006-10-24 Intel Corporation Sensing with defective cell detection
CN105991997A (zh) * 2015-03-06 2016-10-05 成都方程式电子有限公司 一种电容式图像传感器坏点实时定位的方法
CN105469083A (zh) * 2015-11-13 2016-04-06 广东欧珀移动通信有限公司 指纹图像处理方法、装置和终端设备
CN105809133A (zh) * 2016-03-08 2016-07-27 广东欧珀移动通信有限公司 指纹特征信息更新方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472393A (zh) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 基于生物识别的信息显示方法、装置、存储介质和设备
CN111947702A (zh) * 2020-07-16 2020-11-17 中广核核电运营有限公司 传感器交叉验证故障诊断方法、装置、计算机设备
CN111947702B (zh) * 2020-07-16 2022-03-18 中广核核电运营有限公司 传感器交叉验证故障诊断方法、装置、计算机设备

Also Published As

Publication number Publication date
CN109844764A (zh) 2019-06-04
CN109844764B (zh) 2021-12-28

Similar Documents

Publication Publication Date Title
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
EP3252663B1 (fr) Procédé de commande de déverrouillage et terminal
US10467451B2 (en) Method for controlling unlocking and terminal
EP3252661B1 (fr) Procédé de commande de déverrouillage d'un terminal et terminal correspondent
US10248836B2 (en) Fingerprint unlocking method and terminal
US11290447B2 (en) Face verification method and device
US10061970B2 (en) Method for controlling unlocking and mobile terminal
US9965086B2 (en) Method for enabling function module of terminal, and terminal device
WO2019041243A1 (fr) Procédé de vérification de fonction de capteur d'empreinte digitale et terminal
CN107592419A (zh) 基于指纹传感器的显示屏唤醒方法、装置及移动终端
US10885294B2 (en) Finger print sensor with passive proximity detection for power savings in an electronic device
WO2019101096A1 (fr) Procédé et dispositif de vérification de sécurité et terminal mobile
CN105912916B (zh) 一种指纹解锁方法及终端
US20170344781A1 (en) Method for Controlling Unlocking and Terminal
CN110287666B (zh) 指纹解锁的方法及相关装置
US11354391B2 (en) Power saving in device with ultrasonic fingerprint sensors
WO2017185670A1 (fr) Procédé et dispositif de commande de capteur d'empreinte digitale, et dispositif électronique
WO2019033867A1 (fr) Procédé et dispositif d'entrée, et dispositif électronique
CN115098845A (zh) 免密登录方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17923968

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17923968

Country of ref document: EP

Kind code of ref document: A1