WO2019072133A1 - 人脸识别方法及相关产品 - Google Patents
人脸识别方法及相关产品 Download PDFInfo
- Publication number
- WO2019072133A1 WO2019072133A1 PCT/CN2018/109065 CN2018109065W WO2019072133A1 WO 2019072133 A1 WO2019072133 A1 WO 2019072133A1 CN 2018109065 W CN2018109065 W CN 2018109065W WO 2019072133 A1 WO2019072133 A1 WO 2019072133A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- face recognition
- face
- event
- mobile terminal
- policy
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Definitions
- the present application relates to the field of mobile terminal technologies, and in particular, to a face recognition method and related products.
- smartphones can support more and more applications and become more powerful. Smartphones are becoming more and more indispensable in the life of users.
- the embodiment of the present application provides a face recognition method and related products, so as to improve the security and flexibility of the face recognition of the mobile terminal.
- an embodiment of the present application provides a mobile terminal, including a processor, a face image collection device and a memory connected to the processor, where:
- the face image collecting device is configured to collect a face image
- the memory is configured to store a face template
- the processor configured to determine, according to the face recognition request for the first event, a face recognition policy corresponding to the event type of the first event as a first face recognition policy; a face recognition strategy, the first face feature data of the current user is obtained by the face recognition trusted application; and the first face feature data and the first person in the security system are obtained by the face recognition trusted application
- the face templates in the face template set are matched to generate a first matching result; and the first event is processed according to the first matching result.
- the embodiment of the present invention provides a method for a face recognition, which is applied to a mobile terminal, where the mobile terminal runs a security system, and the security system runs a face recognition trusted application, and the method includes:
- an embodiment of the present application provides a mobile terminal, where the mobile terminal runs a security system, and the security system runs a face recognition trusted application, where the mobile terminal includes a determining unit, an acquiring unit, a matching unit, and Processing unit,
- the determining unit is configured to determine, according to the face recognition request for the first event, that the face recognition policy corresponding to the event type of the first event is the first face recognition policy;
- the acquiring unit is configured to acquire first face feature data of the current user by using the face recognition trusted application according to the first face recognition policy;
- the matching unit is configured to match the first face feature data with a face template in the first face template set in the security system by using the face recognition trusted application to generate a first Matching result
- the processing unit is configured to process the first event according to the first matching result.
- an embodiment of the present application provides a mobile terminal, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory, and are configured by The processor executes, the program comprising instructions for performing the steps in any of the methods of the second aspect of the embodiments of the present application.
- the embodiment of the present application provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes the computer to execute as implemented in the present application.
- the computer comprises a mobile terminal.
- an embodiment of the present application provides a computer program product, where the computer program product includes a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to execute Apply some or all of the steps described in any of the methods of the second aspect of the embodiments.
- the computer program product can be a software installation package, the computer comprising a mobile terminal.
- the mobile terminal when detecting the face recognition request for the first event, determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; secondly, according to The first face recognition strategy acquires the first face feature data of the current user through the face recognition trusted application; and again, the first face feature data and the first face in the security system through the face recognition trusted application The face templates in the template set are matched to generate a first matching result; finally, the first event is processed according to the first matching result. Since the face recognition trusted application runs in the security system and the application of the Android system is isolated from each other, the face recognition process for processing the first event through the face recognition trusted application is more secure, and can effectively avoid Android. The system's illegal application or service steals or tampers with the process data to improve the security of the face recognition of the first event.
- FIG. 1 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
- FIG. 2A is a schematic flowchart of a face recognition method disclosed in an embodiment of the present application.
- 2B is a schematic diagram showing an architecture of an Android system and a security system according to an embodiment of the present application
- FIG. 3 is a schematic flowchart diagram of another face recognition method disclosed in an embodiment of the present application.
- FIG. 4 is a schematic flowchart diagram of another face recognition method disclosed in an embodiment of the present application.
- FIG. 5 is a schematic structural diagram of a mobile terminal according to an embodiment of the present disclosure.
- FIG. 6 is a structural block diagram of a functional unit of a mobile terminal disclosed in an embodiment of the present application.
- references to "an embodiment” herein mean that a particular feature, structure, or characteristic described in connection with the embodiments can be included in at least one embodiment of the present application.
- the appearances of the phrases in various places in the specification are not necessarily referring to the same embodiments, and are not exclusive or alternative embodiments that are mutually exclusive. Those skilled in the art will understand and implicitly understand that the embodiments described herein can be combined with other embodiments.
- the mobile terminal involved in the embodiments of the present application may include various handheld devices having wireless communication functions, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to the wireless modem, and various forms of user devices (User Equipment, UE), mobile station (MS), terminal device, and the like.
- UE User Equipment
- MS mobile station
- terminal device and the like.
- the devices mentioned above are collectively referred to as mobile terminals.
- the mobile terminal described in the embodiment of the present application is provided with a face image collecting device, and the face image collecting device may be a universal camera module, such as a front camera.
- the face image collecting device may be a universal camera module, such as a front camera.
- FIG. 1 is a schematic structural diagram of a mobile terminal 100 according to an embodiment of the present application.
- the mobile terminal 100 includes: a shell, a touch display screen, a main board, a battery, and a sub board.
- the device 110, the memory 120, the front camera 130, the SIM card slot, etc., the sub-board is provided with a vibrator, an integrated sound chamber, and a VOOC flash charging interface, and the front camera 130 constitutes a face image collecting device of the mobile terminal 100,
- the face image collecting device may include a camera, wherein
- the face image collecting device 130 is configured to collect a face image
- the memory 120 is configured to store a face template
- the processor 110 is configured to: when detecting a face recognition request for the first event, determine that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; a face recognition strategy for acquiring first face feature data of a current user by a face recognition trusted application; and first, by using the face recognition trusted application, the first face feature data and a first in a security system
- the face templates in the face template collection are matched to generate a first matching result; and the first event is processed according to the first matching result.
- the processor 110 is a control center of the mobile terminal, and connects various parts of the entire mobile terminal by using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and calling and storing in the memory 120.
- the data performing various functions of the mobile terminal and processing data, thereby performing overall monitoring of the mobile terminal.
- the processor 110 can integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, and the like, and the modem processor mainly processes the wireless communication. It will be appreciated that the modem processor may also not be integrated into the processor 110.
- the memory 120 can be used to store software programs and modules, and the processor 110 executes various functional applications and data processing of the mobile terminal by running software programs and modules stored in the memory 120.
- the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function, and the like; the storage data area may store data created according to usage of the mobile terminal, and the like.
- memory 120 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the mobile terminal when detecting the face recognition request for the first event, determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; secondly, according to The first face recognition strategy acquires the first face feature data of the current user through the face recognition trusted application; and again, the first face feature data and the first face in the security system through the face recognition trusted application The face templates in the template set are matched to generate a first matching result; finally, the first event is processed according to the first matching result. Since the face recognition trusted application runs in the security system and the application of the Android system is isolated from each other, the face recognition process for processing the first event through the face recognition trusted application is more secure, and can effectively avoid Android. The system's illegal application or service steals or tampers with the process data to improve the security of the face recognition of the first event.
- the mobile terminal is running an Android system, and the Android system runs a face recognition service; the processor 110 is further configured to: when detecting a face recognition request for the second event, Determining, by the face recognition policy, a face recognition policy corresponding to the event type of the second event as a second face recognition policy; and collecting a second face feature of the current user by using the face recognition service according to the second face recognition policy Data, matching the second face feature data with a face template in the second face template set in the Android system, and generating a second matching result; and processing the according to the second matching result The second event.
- the data amount of each face template in the first face template set is greater than the data amount of each face template in the second face template set.
- the first matching degree associated with the first matching result is higher than the second matching degree associated with the second matching result.
- the processor 110 is specifically configured to: when the face recognition request for the first event is detected, use the event type of the first event as the query identifier to query a mapping relationship between the preset event type and the face recognition policy. Determining, by the first face recognition policy, the event type of the first event.
- FIG. 2A is a schematic flowchart of a method for recognizing a face according to an embodiment of the present application, which is applied to a mobile terminal, where the mobile terminal runs an Android system and a security system, and the Android system runs face recognition.
- Service Service the face recognition trusted application TA is run in the security system.
- the face recognition method includes:
- the event type may be an event type classified according to a function or a task, such as unlocking (such as unlocking the screen, unlocking the application, unlocking the file, unlocking the file, etc.), and paying (such as large payment, small payment, fast payment, offline payment, etc.) )Wait.
- the event type may also be an event type classified according to a security level, such as a high security level type, a medium security level type, a low security level type, and the like. There is no single limit here.
- the different event types correspond to different face recognition strategies
- the mobile terminal may pre-store the mapping relationship between the event type and the face device policy, such as setting the event type of the first event to correspond to the first face recognition policy, and the second event
- the event type corresponds to the second face recognition strategy and the like.
- the mapping relationship may be specifically set by the user, or pushed to the mobile terminal by the server, or preset by the developer before leaving the factory, or based on the intelligent statistical history usage record of the machine learning algorithm such as big data analysis, which is not analyzed here. The only limit.
- the mobile terminal acquires first face feature data of the current user by using the face recognition trusted application according to the first face recognition policy;
- the face recognition trusted application TA is an application in the security system.
- the mobile terminal runs a Rich Execution Environment (REE, REE) and a Trust Execution Environment (TEE).
- TEE has its own execution space, which means that there is also an operating system in the TEE environment.
- the TEE environment has a higher security level than the Rich OS (ordinary operating system).
- the hardware and software resources that TEE can access are separate from Rich OS.
- TEE provides a secure execution environment for trusted applications TA, while also protecting the confidentiality, integrity, and access rights of TA resources and data.
- the TEE is verified and isolated from the Android operating system during the secure boot process.
- each TA is independent of each other and cannot be accessed from each other without authorization.
- the face recognition TA is a trusted application in an application supported by a Trust Execution Environment (TEE) corresponding to the security system of the mobile terminal.
- TEE Trust Execution Environment
- the mobile terminal matches the first face feature data with a face template in the first face template set in the security system by using the face recognition trusted application to generate a first match. result;
- the mobile terminal processes the first event according to the first matching result.
- the mobile terminal when detecting the face recognition request for the first event, determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; secondly, according to The first face recognition strategy acquires the first face feature data of the current user through the face recognition trusted application; and again, the first face feature data and the first face in the security system through the face recognition trusted application The face templates in the template set are matched to generate a first matching result; finally, the first event is processed according to the first matching result. Since the face recognition trusted application runs in the security system and the application of the Android system is isolated from each other, the face recognition process for processing the first event through the face recognition trusted application is more secure, and can effectively avoid Android. The system's illegal application or service steals or tampers with the process data to improve the security of the face recognition of the first event.
- the mobile terminal runs an Android system, and the Android system runs a face recognition service; the method further includes: when the mobile terminal detects a face recognition request for the second event Determining, by the face recognition policy, the second face feature of the current user by using the face recognition policy according to the second face recognition policy Data, matching the second face feature data with a face template in the second face template set in the Android system, and generating a second matching result; processing the first according to the second matching result Second event.
- the security of the face recognition process based on the face recognition TA of the security system is higher than that of the face recognition service based on the Android system. Therefore, from the perspective of security, the security requirements can be compared.
- the face recognition process of the high event is assigned to the face recognition TA of the security system to complete, and the face recognition process of the event of the relatively low security level is assigned to the face recognition service of the Android system to complete.
- a first face recognition policy with a higher security level and a longer processing time is selected for a payment type event
- a second face with a lower security level and a faster processing speed is selected for the application startup type event.
- the identification strategy enables a refined selection of the face recognition process for different event types.
- the mobile terminal can flexibly select a corresponding face recognition policy for face recognition based on the event type corresponding to the event, which is beneficial to improving the degree of refinement of the face recognition by the mobile terminal. flexibility.
- the data amount of each face template in the first face template set is greater than the data amount of each face template in the second face template set.
- the face feature data is matched to match the security.
- the differentiated face recognition process can be realized, which is beneficial to improving the comprehensiveness and flexibility of the face recognition of the mobile terminal.
- the first matching degree associated with the first matching result is higher than the second matching degree associated with the second matching result.
- the differentiated face recognition process can be realized by differentiating the matching degree, which is beneficial to improving the comprehensiveness and flexibility of the face recognition of the mobile terminal.
- determining that the face recognition policy corresponding to the event type of the first event is the first face recognition policy includes:
- the event type of the first event is used as a query identifier, and a mapping relationship between the preset event type and the face recognition policy is queried to determine the first event.
- the event type is the first face recognition strategy.
- the first face recognition policy can be quickly and accurately determined by querying the mapping relationship.
- FIG. 3 is a schematic flowchart of a face recognition method according to an embodiment of the present disclosure, which is applied to a mobile terminal, where the mobile terminal runs an Android system. And a security system in which the face recognition service Service is run, and the face recognition trusted application TA is run in the security system.
- the face recognition method includes:
- the mobile terminal determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy;
- the mobile terminal acquires first face feature data of the current user by using the face recognition trusted application according to the first face recognition policy;
- the mobile terminal matches the first face feature data with a face template in the first face template set in the security system by using the face recognition trusted application to generate a first match. result;
- the mobile terminal processes the first event according to the first matching result.
- the mobile terminal determines, according to the face recognition request for the second event, that the face recognition policy corresponding to the event type of the second event is a second face recognition policy;
- the mobile terminal collects second facial feature data of the current user by using the face recognition service according to the second face recognition policy, and the second facial feature data is compared with the second facial feature data in the Android system.
- the face templates in the second face template collection are matched, and a second matching result is generated;
- the mobile terminal processes the second event according to the second matching result.
- the mobile terminal when detecting the face recognition request for the first event, determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; secondly, according to The first face recognition strategy acquires the first face feature data of the current user through the face recognition trusted application; and again, the first face feature data and the first face in the security system through the face recognition trusted application The face templates in the template set are matched to generate a first matching result; finally, the first event is processed according to the first matching result. Since the face recognition trusted application runs in the security system and the application of the Android system is isolated from each other, the face recognition process for processing the first event through the face recognition trusted application is more secure, and can effectively avoid Android. The system's illegal application or service steals or tampers with the process data to improve the security of the face recognition of the first event.
- the mobile terminal can flexibly select a corresponding face recognition policy for face recognition based on the event type corresponding to the event, such as selecting a security level for a payment type event and a long processing time.
- the first face recognition strategy selects a second face recognition strategy with a lower security level and a faster processing speed for the application startup type event, so that the refined selection of the face recognition process can be implemented for different event types, which is beneficial to improve The degree of precision and flexibility of face recognition by mobile terminals.
- FIG. 4 is a schematic flowchart of a face recognition method according to an embodiment of the present application, which is applied to a mobile terminal, where the mobile terminal runs an Android system. And a security system in which the face recognition service Service is run, and the face recognition trusted application TA is run in the security system.
- the face recognition method includes:
- the mobile terminal when detecting the face recognition request for the first event, uses the event type of the first event as the query identifier to query a mapping relationship between the preset event type and the face recognition policy, and determines the location.
- the event type of the first event is the first face recognition strategy.
- the mobile terminal acquires first face feature data of the current user by using the face recognition trusted application according to the first face recognition policy.
- the mobile terminal matches the first face feature data with a face template in the first face template set in the security system by using the face recognition trusted application to generate a first match. result;
- the mobile terminal processes the first event according to the first matching result.
- the mobile terminal determines, according to the face recognition request for the second event, that the face recognition policy corresponding to the event type of the second event is a second face recognition policy;
- the mobile terminal collects second facial feature data of the current user by using the facial recognition service according to the second facial recognition policy, and the second facial feature data is compared with the second facial feature data in the Android system.
- the face templates in the second face template collection are matched, and a second matching result is generated;
- the data amount of each face template in the first face template set is greater than the data amount of each face template in the second face template set.
- the first matching degree associated with the first matching result is higher than the second matching degree associated with the second matching result.
- the mobile terminal processes the second event according to the second matching result.
- the mobile terminal when detecting the face recognition request for the first event, determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; secondly, according to The first face recognition strategy acquires the first face feature data of the current user through the face recognition trusted application; and again, the first face feature data and the first face in the security system through the face recognition trusted application The face templates in the template set are matched to generate a first matching result; finally, the first event is processed according to the first matching result. Since the face recognition trusted application runs in the security system and the application of the Android system is isolated from each other, the face recognition process for processing the first event through the face recognition trusted application is more secure, and can effectively avoid Android. The system's illegal application or service steals or tampers with the process data to improve the security of the face recognition of the first event.
- the mobile terminal can flexibly select a corresponding face recognition policy for face recognition based on the event type corresponding to the event, such as selecting a security level for a payment type event and a long processing time.
- the first face recognition strategy selects a second face recognition strategy with a lower security level and a faster processing speed for the application startup type event, so that the refined selection of the face recognition process can be implemented for different event types, which is beneficial to improve The degree of precision and flexibility of face recognition by mobile terminals.
- the differentiated face recognition process can be realized, which is beneficial to improving the comprehensiveness and flexibility of the face recognition of the mobile terminal.
- the differentiated face recognition process can be realized, which is beneficial to improving the comprehensiveness and flexibility of the face recognition of the mobile terminal.
- FIG. 5 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
- the mobile terminal includes a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the program comprising the steps of performing the following steps Instruction
- the mobile terminal when detecting the face recognition request for the first event, determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; secondly, according to The first face recognition strategy acquires the first face feature data of the current user through the face recognition trusted application; and again, the first face feature data and the first face in the security system through the face recognition trusted application The face templates in the template set are matched to generate a first matching result; finally, the first event is processed according to the first matching result. Since the face recognition trusted application runs in the security system and the application of the Android system is isolated from each other, the face recognition process for processing the first event through the face recognition trusted application is more secure, and can effectively avoid Android. The system's illegal application or service steals or tampers with the process data to improve the security of the face recognition of the first event.
- the mobile terminal is running an Android system
- the face recognition service is running in the Android system
- the program further includes an instruction to: detect a face for the second event When the request is identified, determining that the face recognition policy corresponding to the event type of the second event is a second face recognition policy; and collecting, according to the second face recognition policy, the current user by using the face recognition service Two face feature data, matching the second face feature data with a face template in the second face template set in the Android system, and generating a second matching result; and according to the second match The result processes the second event.
- the data amount of each face template in the first face template set is greater than the data amount of each face template in the second face template set.
- the first matching degree associated with the first matching result is higher than the second matching degree associated with the second matching result.
- the instructions in the program are specifically configured to: when detecting a face recognition request for the first event, using the event type of the first event as a query identifier, querying a preset event type and a face recognition policy The mapping relationship between the first event identifies the event type of the first event as the first face recognition policy.
- the mobile terminal 600 is a block diagram of a functional unit of a mobile terminal provided by an embodiment of the present application.
- the mobile terminal runs an Android system and a security system, and the Android system runs a face recognition service,
- the face recognition trusted application TA is run in the security system, and the mobile terminal 600 includes: a determining unit 601, an obtaining unit 602, a matching unit 603, and a processing unit 604, where
- the determining unit 601 is configured to: when detecting a face recognition request for the first event, determine that the face recognition policy corresponding to the event type of the first event is the first face recognition policy;
- the obtaining unit 602 is configured to acquire first face feature data of the current user by using the face recognition trusted application according to the first face recognition policy;
- the matching unit 603 is configured to match the first face feature data with a face template in the first face template set in the security system by using the face recognition trusted application to generate a first a matching result;
- the processing unit 604 is configured to process the first event according to the first matching result.
- the mobile terminal when detecting the face recognition request for the first event, determines that the face recognition policy corresponding to the event type of the first event is the first face recognition policy; secondly, according to The first face recognition strategy acquires the first face feature data of the current user through the face recognition trusted application; and again, the first face feature data and the first face in the security system through the face recognition trusted application The face templates in the template set are matched to generate a first matching result; finally, the first event is processed according to the first matching result. Since the face recognition trusted application runs in the security system and the application of the Android system is isolated from each other, the face recognition process for processing the first event through the face recognition trusted application is more secure, and can effectively avoid Android. The system's illegal application or service steals or tampers with the process data to improve the security of the face recognition of the first event.
- the mobile terminal is running an Android system
- the face recognition service is running in the Android system.
- the determining unit 601 is further configured to: when detecting a face recognition request for the second event, Determining, by the face recognition strategy corresponding to the event type of the second event, a second face recognition strategy;
- the acquiring unit 602 is further configured to collect the second facial feature data of the current user by using the face recognition service according to the second face recognition policy;
- the matching unit 603 is further configured to: match the second facial feature data with a facial template in the second facial template set in the Android system, and generate a second matching result;
- the processing unit 604 is further configured to process the second event according to the second matching result.
- the data amount of each face template in the first face template set is greater than the data amount of each face template in the second face template set.
- the first matching degree associated with the first matching result is higher than the second matching degree associated with the second matching result.
- the determining unit 601 is specifically configured to: when the face recognition request for the first event is detected, use the event type of the first event as the query identifier to query a mapping relationship between the preset event type and the face recognition policy Determining, by the first face recognition policy, the event type of the first event.
- the mobile terminal described in the device embodiment of the present application is presented in the form of a functional unit.
- the term "unit” as used herein shall be understood to mean the broadest possible meaning, and the object for implementing the functions described for each "unit” may be, for example, an integrated circuit ASIC, a single circuit for executing one or more software or firmware.
- a processor shared, dedicated or chipset
- memory of the program combinatorial logic, and/or other suitable components that perform the functions described above.
- the determining unit 601, the matching unit 603, and the processing unit 604 may be a processor or a controller, and the obtaining unit 602 may be a communication interface.
- the embodiment of the present application further provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, the computer program causing the computer to execute part or all of any of the methods described in the method embodiment.
- the computer includes a mobile terminal.
- the embodiment of the present application further provides a computer program product, comprising: a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to execute as described in the method embodiment Part or all of the steps of either method.
- the computer program product can be a software installation package, the computer comprising a mobile terminal.
- the disclosed apparatus may be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory.
- a computer readable memory A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the above-described methods of various embodiments of the present application.
- the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
- ROM Read-Only Memory
- RAM Random Access Memory
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Telephone Function (AREA)
Abstract
本申请实施例公开了一种人脸识别方法及相关产品,包括:在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;以及按照所述第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;以及通过所述人脸识别可信应用将所述第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;以及根据所述第一匹配结果处理所述第一事件。本申请实施例有利于提升移动终端处理第一事件的人脸识别过程的安全性。
Description
本申请涉及移动终端技术领域,具体涉及一种人脸识别方法及相关产品。
随着智能手机的大量普及应用,智能手机能够支持的应用越来越多,功能越来越强大,智能手机向着多样化、个性化的方向发展,成为用户生活中不可缺少的电子用品。
目前,随着智能手机越来越高的安全性需求,多种生物信息解锁方案应运而生,例如指纹解锁,人脸解锁,虹膜解锁等,其中,由于人脸解锁的解锁速度较快,识别成功率较高,使其成为众多智能手机的首要选择。
发明内容
本申请实施例提供了一种人脸识别方法及相关产品,以期提升移动终端的人脸识别的安全性和灵活性。
第一方面,本申请实施例提供一种移动终端,包括处理器,连接所述处理器的人脸图像采集装置和存储器,其中:
所述人脸图像采集装置,用于采集人脸图像;
所述存储器,用于存储人脸模板;
所述处理器,用于在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;以及按照所述第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;以及通过所述人脸识别可信应用将所述第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;以及根据所述第一匹配结果处理所述第一事件。
第二方面,本申请实施例提供一种人脸识别方法,应用于移动终端,所述移动终端运行有安全系统,所述安全系统中运行有人脸识别可信应用,所述方法包括:
在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;
按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;
通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;
根据所述第一匹配结果处理所述第一事件。
第三方面,本申请实施例提供一种移动终端,所述移动终端运行有安全系统,所述安全系统中运行有人脸识别可信应用,所述移动终端包括确定单元、获取单元、匹配单元和处理单元,
所述确定单元,用于在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;
所述获取单元,用于按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;
所述匹配单元,用于通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;
所述处理单元,用于根据所述第一匹配结果处理所述第一事件。
第四方面,本申请实施例提供一种移动终端,包括处理器、存储器、通信接口以及一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中,并且被配置由所述处理器执行,所述程序包括用于执行本申请实施例第二方面任一方法中的步骤的指令。
第五方面,本申请实施例提供了一种计算机可读存储介质,其中,所述计算机可读存储介质存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如本申请实施例第二方面任一方法中所描述的部分或全部步骤,所述计算机包括移动终端。
第六方面,本申请实施例提供了一种计算机程序产品,其中,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如本申请实施例第二方面任一方法中所描述的部分或全部步骤。该计算机程序产品可以为一个软件安装包,所述计算机包括移动终端。
可以看出,本申请实施例中,移动终端在检测到针对第一事件的人脸识别请求时,确定第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;其次,按照第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;再次,通过人脸识别可信应用将第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;最后,根据第一匹配结果处理第一事件。由于人脸识别可信应用运行在安全系统,与安卓系统的应用程序是相互隔离的,故而通过人脸识别可信应用处理第一事件的人脸识别过程安全性会更高,能够有效避免安卓系统的非法应用程序或服务窃取或篡改处理过程的数据,提高第一事件的人脸识别的安全性。
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种移动终端的结构示意图;
图2A是本申请实施例公开的一种人脸识别方法的流程示意图;
图2B是本申请实施例公开的一种安卓系统和安全系统的架构示例图;
图3是本申请实施例公开的另一种人脸识别方法的流程示意图;
图4是本申请实施例公开的另一种人脸识别方法的流程示意图;
图5是本申请实施例公开的一种移动终端的结构示意图;
图6是本申请实施例公开的一种移动终端的功能单元组成框图。
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书及所述附图中的术语“第一”、“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其他步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
本申请实施例所涉及到的移动终端可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其他处理设备,以及各种形式的用户设备(User Equipment,UE),移动台(Mobile Station,MS),终端设备(terminal device)等等。为方便描述,上面提到的设备统称为移动终端。
本申请实施例所描述的移动终端设置有人脸图像采集装置,人脸图像采集装置可以是通用摄像头模组,如前置摄像头。下面对本申请实施例进行详细介绍。
请参阅图1,图1是本申请实施例提供了一种移动终端100的结构示意图,所述移动终端100包括:壳体、触控显示屏、主板、电池和副板,主板上设置有处理器110、存储器120、前置摄像头130和SIM卡槽等,副板上设置有振子、一体音腔、VOOC闪充接口,所述前置摄像头130组成该移动终端100的人脸图像采集装置,所述人脸图像采集装置可以包括摄像头,其中,
所述人脸图像采集装置130,用于采集人脸图像;
所述存储器120,用于存储面部模板;
所述处理器110,用于在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;以及按照所述第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;以及通过所述人脸识别可信应用将所述第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;以及根据所述第一匹配结果处理所述第一事件。
其中,处理器110是移动终端的控制中心,利用各种接口和线路连接整个移动终端的各个部分,通过运行或执行存储在存储器120内的软件程序和/或模块,以及调用存储在存储器120内的数据,执行移动终端的各种功能和处理数据,从而对移动终端进行整体监控。可选的,处理器110可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,所述调制解调处理器也可以不集成到处理器110中。
其中,存储器120可用于存储软件程序以及模块,处理器110通过运行存储在存储器120的软件程序以及模块,从而执行移动终端的各种功能应用以及数据处理。存储器120可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序等;存储数据区可存储根据移动终端的使用所创建的数据等。此外,存储器120可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
可以看出,本申请实施例中,移动终端在检测到针对第一事件的人脸识别请求时,确定第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;其次,按照第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;再次,通过人脸识别可信应用将第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;最后,根据第一匹配结果处理第一事件。由于人脸识别可信应用运行在安全系统,与安卓系统的应用程序是相互隔离的,故而通过人脸识别可信应用处理第一事件的人脸识别过程安全性会更高,能够有效避免安卓系统的非法应用程序或服务窃取或篡改处理过程的数据,提高第一事件的人脸识别的安全性。
在一个可能的示例中,所述移动终端运行有安卓系统,所述安卓系统中运行有人脸识 别服务;所述处理器110还用于:在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;以及按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;以及根据所述第二匹配结果处理所述第二事件。
在一个可能的示例中,所述第一人脸模板集合中的每个人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
在一个可能的示例中,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
在一个可能的示例中,在所述在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略方面,所述处理器110具体用于:在检测到针对第一事件的人脸识别请求时,以所述第一事件的事件类型为查询标识,查询预设的事件类型和人脸识别策略之间的映射关系,确定所述第一事件的事件类型为所述第一人脸识别策略。
请参阅图2A,图2A是本申请实施例提供了一种人脸识别方法的流程示意图,应用于移动终端,所述移动终端运行有安卓系统和安全系统,所述安卓系统中运行有人脸识别服务Service,所述安全系统中运行有人脸识别可信应用TA,如图所示,本人脸识别方法包括:
S201,移动终端在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;
其中,事件类型可以是按照功能或者任务进行划分的事件类型,如解锁(如熄屏解锁、应用启动解锁、文件解锁等)、支付(如大额支付、小额支付、快捷支付、离线支付等)等。该事件类型还可以是按照安全等级进行划分的事件类型,如高安全等级类型、中安全等级类型、低安全等级类型等。此处不做唯一限定。
其中,不同的事件类型对应不同的人脸识别策略,移动终端可以预存事件类型和人脸设备策略之间的映射关系,如设置第一事件的事件类型对应第一人脸识别策略,第二事件的事件类型对应第二人脸识别策略等。该映射关系具体可以由用户设置,或者由服务器推送给移动终端,或者在出厂前由开发人员进行预设,或者基于大数据分析等机器学习算法智能统计历史使用记录以分析得到,此处不做唯一限定。
S202,所述移动终端按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;
其中,人脸识别可信应用TA为安全系统中的应用,如图2B所示,移动终端运行有富执行环境(Rich Execution Environment,REE,REE)和可信执行环境(Trust Execution Environment,TEE),TEE具有其自身的执行空间,也就是说在TEE的环境下也有一个操作系统。TEE环境比Rich OS(普通操作系统)的安全级别更高。TEE所能访问的软硬件资源是与Rich OS分离的。TEE提供了可信应用TA的安全执行环境,同时也保护TA的资源和数据的保密性、完整性和访问权限。为了保证TEE本身的可信根,TEE在安全启动过程中是要通过验证并且与安卓操作系统隔离的。在TEE中,每个TA是相互独立的,而且不能在未授权的情况下互相访问。所述人脸识别TA是所述移动终端的安全系统对应的可信执行环境(Trust Execution Environment,TEE)所支持的应用中的可信应用。
S203,所述移动终端通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;
S204,所述移动终端根据所述第一匹配结果处理所述第一事件。
可以看出,本申请实施例中,移动终端在检测到针对第一事件的人脸识别请求时,确定第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;其次,按照第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;再次,通过人脸识别可信应用将第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;最后,根据第一匹配结果处理第一事件。由于人脸识别可信应用运行在安全系统,与安卓系统的应用程序是相互隔离的,故而通过人脸识别可信应用处理第一事件的人脸识别过程安全性会更高,能够有效避免安卓系统的非法应用程序或服务窃取或篡改处理过程的数据,提高第一事件的人脸识别的安全性。
在一个可能的示例中,所述移动终端运行有安卓系统,所述安卓系统中运行有人脸识别服务;所述方法还包括:所述移动终端在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;根据所述第二匹配结果处理所述第二事件。
其中,由于基于安全系统的人脸识别TA的人脸识别过程的安全性要高于基于安卓系统的人脸识别服务的人脸识别过程,故而从安全性角度来说,可以将安全性要求较高的事件的人脸识别过程分配给安全系统的人脸识别TA去完成,而将安全性等级相对较低的事件的人脸识别过程分配给安卓系统的人脸识别服务去完成。
举例来说,如针对支付类型的事件选择安全性等级较高、处理时长较长的第一人脸识别策略,针对应用启动类型事件选择安全性等级较低、处理速度更快的第二人脸识别策略,如此可以针对不同事件类型实现人脸识别过程的精细化选择。
可见,本示例中,移动终端针对不同的事件,能够基于该事件对应的事件类型,灵活选取对应的人脸识别策略以进行人脸识别,有利于提高移动终端进行人脸识别的精细化程度和灵活性。
在一个可能的示例中,所述第一人脸模板集合中的每个人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
其中,由于人脸模板所包含的模板数据的数据量越多,则在匹配度要求不变的情况下,数据量多的人脸模板的匹配复杂度越高,从而需要越多的当期那用户的人脸特征数据来进行匹配,对应安全性会越高。
可见,本示例中,通过差异化人脸模板的人脸特征数据的数据量,能够实现差异化人脸识别过程,有利于提高移动终端进行人脸识别的全面性和灵活性。
在一个可能的示例中,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
其中,匹配度越高,匹配成功难度越大,安全性越高,但同时计算复杂度也提升。
可见,本示例中,通过差异化匹配度,能够实现差异化人脸识别过程,有利于提高移动终端进行人脸识别的全面性和灵活性。
在一个可能的示例中,所述在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略,包括:
在检测到针对第一事件的人脸识别请求时,以所述第一事件的事件类型为查询标识,查询预设的事件类型和人脸识别策略之间的映射关系,确定所述第一事件的事件类型为所述第一人脸识别策略。
可见,本示例中,通过查询映射关系的方式能够快捷、准确的确定出第一人脸识别策 略。
与所述图2A所示的实施例一致的,请参阅图3,图3是本申请实施例提供的一种人脸识别方法的流程示意图,应用于移动终端,所述移动终端运行有安卓系统和安全系统,所述安卓系统中运行有人脸识别服务Service,所述安全系统中运行有人脸识别可信应用TA。如图所示,本人脸识别方法包括:
S301,移动终端在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;
S302,所述移动终端按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;
S303,所述移动终端通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;
S304,所述移动终端根据所述第一匹配结果处理所述第一事件。
S305,所述移动终端在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;
S306,所述移动终端按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;
S307,所述移动终端根据所述第二匹配结果处理所述第二事件。
可以看出,本申请实施例中,移动终端在检测到针对第一事件的人脸识别请求时,确定第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;其次,按照第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;再次,通过人脸识别可信应用将第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;最后,根据第一匹配结果处理第一事件。由于人脸识别可信应用运行在安全系统,与安卓系统的应用程序是相互隔离的,故而通过人脸识别可信应用处理第一事件的人脸识别过程安全性会更高,能够有效避免安卓系统的非法应用程序或服务窃取或篡改处理过程的数据,提高第一事件的人脸识别的安全性。
此外,移动终端针对不同的事件,能够基于该事件对应的事件类型,灵活选取对应的人脸识别策略以进行人脸识别,如针对支付类型的事件选择安全性等级较高、处理时长较长的第一人脸识别策略,针对应用启动类型事件选择安全性等级较低、处理速度更快的第二人脸识别策略,如此可以针对不同事件类型实现人脸识别过程的精细化选择,有利于提高移动终端进行人脸识别的精确化程度和灵活性。
与所述图2A所示的实施例一致的,请参阅图4,图4是本申请实施例提供的一种人脸识别方法的流程示意图,应用于移动终端,所述移动终端运行有安卓系统和安全系统,所述安卓系统中运行有人脸识别服务Service,所述安全系统中运行有人脸识别可信应用TA。如图所示,本人脸识别方法包括:
S401,移动终端在检测到针对第一事件的人脸识别请求时,以所述第一事件的事件类型为查询标识,查询预设的事件类型和人脸识别策略之间的映射关系,确定所述第一事件的事件类型为所述第一人脸识别策略。
S402,所述移动终端按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;
S403,所述移动终端通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全 系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;
S404,所述移动终端根据所述第一匹配结果处理所述第一事件。
S405,所述移动终端在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;
S406,所述移动终端按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;
其中,所述第一人脸模板集合中的每个人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
其中,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
S407,所述移动终端根据所述第二匹配结果处理所述第二事件。
可以看出,本申请实施例中,移动终端在检测到针对第一事件的人脸识别请求时,确定第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;其次,按照第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;再次,通过人脸识别可信应用将第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;最后,根据第一匹配结果处理第一事件。由于人脸识别可信应用运行在安全系统,与安卓系统的应用程序是相互隔离的,故而通过人脸识别可信应用处理第一事件的人脸识别过程安全性会更高,能够有效避免安卓系统的非法应用程序或服务窃取或篡改处理过程的数据,提高第一事件的人脸识别的安全性。
此外,移动终端针对不同的事件,能够基于该事件对应的事件类型,灵活选取对应的人脸识别策略以进行人脸识别,如针对支付类型的事件选择安全性等级较高、处理时长较长的第一人脸识别策略,针对应用启动类型事件选择安全性等级较低、处理速度更快的第二人脸识别策略,如此可以针对不同事件类型实现人脸识别过程的精细化选择,有利于提高移动终端进行人脸识别的精确化程度和灵活性。
此外,通过差异化人脸模板的人脸特征数据的数据量,能够实现差异化人脸识别过程,有利于提高移动终端进行人脸识别的全面性和灵活性。
此外,通过差异化匹配度,能够实现差异化人脸识别过程,有利于提高移动终端进行人脸识别的全面性和灵活性。
与所述图2A、图3、图4所示的实施例一致的,请参阅图5,图5是本申请实施例提供的一种移动终端的结构示意图,如图所示,该移动终端包括处理器、存储器、通信接口以及一个或多个程序,其中,所述一个或多个程序被存储在所述存储器中,并且被配置由所述处理器执行,所述程序包括用于执行以下步骤的指令;
在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;
按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;
通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;
根据所述第一匹配结果处理所述第一事件。
可以看出,本申请实施例中,移动终端在检测到针对第一事件的人脸识别请求时,确定第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;其次,按照第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;再次,通过人脸识别 可信应用将第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;最后,根据第一匹配结果处理第一事件。由于人脸识别可信应用运行在安全系统,与安卓系统的应用程序是相互隔离的,故而通过人脸识别可信应用处理第一事件的人脸识别过程安全性会更高,能够有效避免安卓系统的非法应用程序或服务窃取或篡改处理过程的数据,提高第一事件的人脸识别的安全性。
在一个可能的示例中,所述移动终端运行有安卓系统,所述安卓系统中运行有人脸识别服务;所述程序还包括用于执行以下操作的指令:在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;以及按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;以及根据所述第二匹配结果处理所述第二事件。
在一个可能的示例中,所述第一人脸模板集合中的每个人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
在一个可能的示例中,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
在一个可能的示例中,在所述在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略方面,所述程序中的指令具体用于执行以下操作:在检测到针对第一事件的人脸识别请求时,以所述第一事件的事件类型为查询标识,查询预设的事件类型和人脸识别策略之间的映射关系,确定所述第一事件的事件类型为所述第一人脸识别策略。
与上述实施例一致的,图6是本申请实施例提供的一种移动终端的功能单元组成框图,所述移动终端运行有安卓系统和安全系统,所述安卓系统中运行有人脸识别服务Service,所述安全系统中运行有人脸识别可信应用TA,该移动终端600包括:确定单元601、获取单元602、匹配单元603和处理单元604,其中,
所述确定单元601,用于在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;
所述获取单元602,用于按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;
所述匹配单元603,用于通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;
所述处理单元604,用于根据所述第一匹配结果处理所述第一事件。
可以看出,本申请实施例中,移动终端在检测到针对第一事件的人脸识别请求时,确定第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;其次,按照第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;再次,通过人脸识别可信应用将第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;最后,根据第一匹配结果处理第一事件。由于人脸识别可信应用运行在安全系统,与安卓系统的应用程序是相互隔离的,故而通过人脸识别可信应用处理第一事件的人脸识别过程安全性会更高,能够有效避免安卓系统的非法应用程序或服务窃取或篡改处理过程的数据,提高第一事件的人脸识别的安全性。
在一个可能的示例中,所述移动终端运行有安卓系统,所述安卓系统中运行有人脸识别服务;所述确定单元601,还用于在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;
所述获取单元602,还用于按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据;
所述匹配单元603,还用于将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;
所述处理单元604,还用于根据所述第二匹配结果处理所述第二事件。
在一个可能的示例中,所述第一人脸模板集合中的每个人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
在一个可能的示例中,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
在一个可能的示例中,在所述在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略方面,所述确定单元601具体用于:在检测到针对第一事件的人脸识别请求时,以所述第一事件的事件类型为查询标识,查询预设的事件类型和人脸识别策略之间的映射关系,确定所述第一事件的事件类型为所述第一人脸识别策略。
需要注意的是,本申请装置实施例所描述的移动终端是以功能单元的形式呈现。这里所使用的术语“单元”应当理解为尽可能最宽的含义,用于实现各个“单元”所描述功能的对象例如可以是集成电路ASIC,单个电路,用于执行一个或多个软件或固件程序的处理器(共享的、专用的或芯片组)和存储器,组合逻辑电路,和/或提供实现上述功能的其他合适的组件。
其中,所述确定单元601、所述匹配单元603和处理单元604可以是处理器或者控制器,所述获取单元602可以是通信接口。
本申请实施例还提供一种计算机存储介质,其中,该计算机存储介质存储用于电子数据交换的计算机程序,该计算机程序使得计算机执行如所述方法实施例中记载的任一方法的部分或全部步骤,所述计算机包括移动终端。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如所述方法实施例中记载的任一方法的部分或全部步骤。该计算机程序产品可以为一个软件安装包,所述计算机包括移动终端。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。
在所述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置,可通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。所述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储器中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本申请各个实施例上述方法的全部或部分步骤。而前述的存储器包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储器中,存储器可以包括:闪存盘、只读存储器(英文:Read-Only Memory,简称:ROM)、随机存取器(英文:Random Access Memory,简称:RAM)、磁盘或光盘等。
以上对本申请实施例进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。
Claims (20)
- 一种移动终端,其特征在于,包括处理器,连接所述处理器的人脸图像采集装置和存储器,其中:所述人脸图像采集装置,用于采集人脸图像;所述存储器,用于存储人脸模板;所述处理器,用于在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;以及按照所述第一人脸识别策略,通过人脸识别可信应用获取当前用户的第一人脸特征数据;以及通过所述人脸识别可信应用将所述第一人脸特征数据与安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;以及根据所述第一匹配结果处理所述第一事件。
- 根据权利要求1所述的移动终端,其特征在于,所述移动终端运行有安卓系统,所述安卓系统中运行有人脸识别服务;所述处理器还用于:在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;以及按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;以及根据所述第二匹配结果处理所述第二事件。
- 根据权利要求2所述的移动终端,其特征在于,所述第一人脸模板集合中的每个人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
- 根据权利要求3所述的移动终端,其特征在于,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
- 根据权利要求1-4任一项所述的移动终端,其特征在于,在所述在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略方面,所述处理器具体用于:在检测到针对第一事件的人脸识别请求时,以所述第一事件的事件类型为查询标识,查询预设的事件类型和人脸识别策略之间的映射关系,确定所述第一事件的事件类型为所述第一人脸识别策略。
- 一种人脸识别方法,其特征在于,应用于移动终端,所述移动终端运行有安全系统,所述安全系统中运行有人脸识别可信应用,所述方法包括:在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;根据所述第一匹配结果处理所述第一事件。
- 根据权利要求6所述的方法,其特征在于,所述事件类型的划分策略包括以下任意一种:按照功能划分的策略、按照任务划分的策略、按照安全性等级划分的策略。
- 根据权利要求7所述的方法,其特征在于,所述移动终端预存有事件类型和人脸识别策略之间的映射关系,所述映射关系由以下任意一种实现方式得到:由用户设置、由服务器推送给移动终端、在出厂前由开发人员进行预设、智能统计历史使用记录以分析得到。
- 根据权利要求6-8任一项所述的方法,其特征在于,所述移动终端运行有安卓系统, 所述安卓系统中运行有人脸识别服务;所述方法还包括:在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;根据所述第二匹配结果处理所述第二事件。
- 根据权利要求9所述的方法,其特征在于,所述第一人脸模板集合中的每个人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
- 根据权利要求10所述的方法,其特征在于,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
- 根据权利要求6-11任一项所述的方法,其特征在于,所述在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略,包括:在检测到针对第一事件的人脸识别请求时,以所述第一事件的事件类型为查询标识,查询预设的事件类型和人脸识别策略之间的映射关系,确定所述第一事件的事件类型为所述第一人脸识别策略。
- 一种移动终端,其特征在于,所述移动终端运行有安全系统,所述安全系统中运行有人脸识别可信应用,所述移动终端包括确定单元、获取单元、匹配单元和处理单元,所述确定单元,用于在检测到针对第一事件的人脸识别请求时,确定所述第一事件的事件类型对应的人脸识别策略为第一人脸识别策略;所述获取单元,用于按照所述第一人脸识别策略,通过所述人脸识别可信应用获取当前用户的第一人脸特征数据;所述匹配单元,用于通过所述人脸识别可信应用将所述第一人脸特征数据与所述安全系统中的第一人脸模板集合中的人脸模板进行匹配,以生成第一匹配结果;所述处理单元,用于根据所述第一匹配结果处理所述第一事件。
- 根据权利要求13所述的移动终端,其特征在于,所述事件类型的划分策略包括以下任意一种:按照功能划分的策略、按照任务划分的策略、按照安全性等级划分的策略。
- 根据权利要求14所述的移动终端,其特征在于,所述移动终端预存有事件类型和人脸识别策略之间的映射关系,所述映射关系由以下任意一种实现方式得到:由用户设置、由服务器推送给移动终端、在出厂前由开发人员进行预设、智能统计历史使用记录以分析得到。
- 根据权利要求13-15任一项所述的移动终端,其特征在于,所述移动终端运行有安卓系统,所述安卓系统中运行有人脸识别服务;所述确定单元,还用于:在检测到针对第二事件的人脸识别请求时,确定所述第二事件的事件类型对应的人脸识别策略为第二人脸识别策略;所述获取单元,还用于按照所述第二人脸识别策略,通过所述人脸识别服务采集当前用户的第二人脸特征数据、将所述第二人脸特征数据与所述安卓系统中的第二人脸模板集合中的人脸模板进行匹配、以及生成第二匹配结果;所述处理单元,还用于根据所述第二匹配结果处理所述第二事件。
- 根据权利要求16所述的移动终端,其特征在于,所述第一人脸模板集合中的每个 人脸模板的数据量大于所述第二人脸模板集合中的每个人脸模板的数据量。
- 根据权利要求17所述的移动终端,其特征在于,所述第一匹配结果关联的第一匹配度高于所述第二匹配结果关联的第二匹配度。
- 一种移动终端,其特征在于,包括处理器、存储器、通信接口,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述处理器执行,所述程序包括用于执行如权利要求6-12任一项所述的方法中的步骤的指令。
- 一种计算机可读存储介质,其特征在于,存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如权利要求6-12任一项所述的方法,所述计算机包括移动终端。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710941356.9A CN107729836B (zh) | 2017-10-11 | 2017-10-11 | 人脸识别方法及相关产品 |
CN201710941356.9 | 2017-10-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019072133A1 true WO2019072133A1 (zh) | 2019-04-18 |
Family
ID=61210342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/109065 WO2019072133A1 (zh) | 2017-10-11 | 2018-09-30 | 人脸识别方法及相关产品 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107729836B (zh) |
WO (1) | WO2019072133A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114995709A (zh) * | 2022-05-13 | 2022-09-02 | 深圳康佳电子科技有限公司 | 一种多窗口拼窗组合交互方法、终端及可读存储介质 |
EP3621294B1 (en) * | 2018-07-16 | 2023-02-22 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and device for image capture, computer readable storage medium and electronic device |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107729836B (zh) * | 2017-10-11 | 2020-03-24 | Oppo广东移动通信有限公司 | 人脸识别方法及相关产品 |
WO2019196793A1 (zh) | 2018-04-12 | 2019-10-17 | Oppo广东移动通信有限公司 | 图像处理方法及装置、电子设备和计算机可读存储介质 |
EP3657774B1 (en) | 2018-04-28 | 2024-05-29 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Control system, control method and control device for camera module, electronic device and computer readable storage medium |
CN108539576B (zh) * | 2018-05-30 | 2020-06-12 | Oppo广东移动通信有限公司 | 激光投射器的控制系统和移动终端 |
WO2019233199A1 (zh) | 2018-06-06 | 2019-12-12 | Oppo广东移动通信有限公司 | 验证方法、验证装置及计算机可读存储介质 |
CN108959880B (zh) * | 2018-06-06 | 2020-09-18 | Oppo广东移动通信有限公司 | 验证方法、验证装置及计算机可读存储介质 |
CN108924340B (zh) * | 2018-06-06 | 2020-09-18 | Oppo广东移动通信有限公司 | 验证方法、验证装置及计算机可读存储介质 |
CN109672659A (zh) * | 2018-09-25 | 2019-04-23 | 平安科技(深圳)有限公司 | 用户端指纹识别方法、装置、设备及可读存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130281206A1 (en) * | 2010-11-15 | 2013-10-24 | Bally Gaming, Inc. | System and Method for Augmented Reality Gaming |
CN105205370A (zh) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | 移动终端安全防护方法及移动终端、安全系统和应用方法 |
CN105760736A (zh) * | 2016-02-19 | 2016-07-13 | 北京奇虎科技有限公司 | 应用程序解锁的方法及解锁装置 |
CN105959317A (zh) * | 2016-07-11 | 2016-09-21 | 深圳市金立通信设备有限公司 | 一种安全认证方法及终端 |
CN106599649A (zh) * | 2016-11-10 | 2017-04-26 | Tcl数码科技(深圳)有限责任公司 | 一种基于摄像头的终端设备用户身份验证方法及系统 |
CN107729836A (zh) * | 2017-10-11 | 2018-02-23 | 广东欧珀移动通信有限公司 | 人脸识别方法及相关产品 |
-
2017
- 2017-10-11 CN CN201710941356.9A patent/CN107729836B/zh active Active
-
2018
- 2018-09-30 WO PCT/CN2018/109065 patent/WO2019072133A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130281206A1 (en) * | 2010-11-15 | 2013-10-24 | Bally Gaming, Inc. | System and Method for Augmented Reality Gaming |
CN105205370A (zh) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | 移动终端安全防护方法及移动终端、安全系统和应用方法 |
CN105760736A (zh) * | 2016-02-19 | 2016-07-13 | 北京奇虎科技有限公司 | 应用程序解锁的方法及解锁装置 |
CN105959317A (zh) * | 2016-07-11 | 2016-09-21 | 深圳市金立通信设备有限公司 | 一种安全认证方法及终端 |
CN106599649A (zh) * | 2016-11-10 | 2017-04-26 | Tcl数码科技(深圳)有限责任公司 | 一种基于摄像头的终端设备用户身份验证方法及系统 |
CN107729836A (zh) * | 2017-10-11 | 2018-02-23 | 广东欧珀移动通信有限公司 | 人脸识别方法及相关产品 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3621294B1 (en) * | 2018-07-16 | 2023-02-22 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and device for image capture, computer readable storage medium and electronic device |
CN114995709A (zh) * | 2022-05-13 | 2022-09-02 | 深圳康佳电子科技有限公司 | 一种多窗口拼窗组合交互方法、终端及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN107729836A (zh) | 2018-02-23 |
CN107729836B (zh) | 2020-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019072133A1 (zh) | 人脸识别方法及相关产品 | |
WO2019072132A1 (zh) | 人脸识别方法及相关产品 | |
CN106062763B (zh) | 一种显示应用、图片的方法、装置及电子设备 | |
WO2015043420A1 (zh) | 权限控制方法和装置 | |
CN107808127B (zh) | 人脸识别方法及相关产品 | |
CN107797868B (zh) | 资源调整方法及装置 | |
CN107807852B (zh) | 应用程序性能控制方法、设备及计算机可读存储介质 | |
CN109074171B (zh) | 输入方法及电子设备 | |
US9904794B2 (en) | Processing secure data | |
CN107317928B (zh) | 信息处理方法、移动终端及计算机可读存储介质 | |
US20160294835A1 (en) | Initiating a Secure Action Via Physical Manipulation | |
US10516699B2 (en) | Electronic device and method for suggesting response manual in occurrence of denial | |
WO2019047708A1 (zh) | 资源配置方法及相关产品 | |
US20180357404A1 (en) | Information processing method and apparatus, and electronic device | |
US20180349580A1 (en) | Information processing method and device, and electronic equipment | |
WO2020048159A1 (zh) | 解锁控制方法及相关装置 | |
CN111373728A (zh) | 相机应用的控制方法及装置 | |
US20140282057A1 (en) | System for applying applications of different operating systems in one electronic device and method thereof | |
EP3983920B1 (en) | Electronic device for controlling access to device resource and operation method thereof | |
US20210011736A1 (en) | Method and apparatus for managing application | |
WO2019080738A1 (zh) | 游戏应用程序控制方法及设备 | |
US10659599B2 (en) | Certificate loading method and related product | |
CN110929241B (zh) | 一种小程序的快速启动方法、装置、介质和电子设备 | |
US20200192942A1 (en) | Method for Processing Application Resources and Related Products | |
CN107465810B (zh) | 数据控制方法及相关产品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18865918 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18865918 Country of ref document: EP Kind code of ref document: A1 |