WO2019196669A1 - 基于激光的安全验证方法、装置及终端设备 - Google Patents
基于激光的安全验证方法、装置及终端设备 Download PDFInfo
- Publication number
- WO2019196669A1 WO2019196669A1 PCT/CN2019/080163 CN2019080163W WO2019196669A1 WO 2019196669 A1 WO2019196669 A1 WO 2019196669A1 CN 2019080163 W CN2019080163 W CN 2019080163W WO 2019196669 A1 WO2019196669 A1 WO 2019196669A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- laser
- image
- visible light
- data
- depth data
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
- G06V40/169—Holistic features and representations, i.e. based on the facial image taken as a whole
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/60—Type of objects
- G06V20/64—Three-dimensional objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
Definitions
- the present application relates to the field of information processing technologies, and in particular, to a laser-based security verification method, apparatus, and terminal device.
- biometric technology has become more and more extensive, especially face recognition, which has been widely used in identity authentication, mobile payment and other scenarios.
- face recognition function can be enabled through the application to obtain the face information of the user and compare with the pre-stored face information. If the comparison is consistent, the authentication is passed and the user logs in successfully.
- the application provides a laser-based security verification method, device and terminal device to improve the security when an application calls data.
- An embodiment of the present application provides a laser-based security verification method, including: emitting laser light to a subject; capturing a laser image passing through the object; transmitting the laser image to a micro control unit MCU, and using the The micro control unit MCU calculates the depth data corresponding to the subject; and provides the depth data to the application through a preset interface, so that the application calls the depth data for secure verification.
- a laser-based security verification apparatus including a transmitting module, a capturing module, a processing module, and a providing module;
- the transmitting module is configured to emit laser light to a subject;
- the capturing module is configured to capture a passing a laser image of the subject;
- the processing module is configured to send the laser image to a micro control unit MCU, and use the micro control unit MCU to calculate depth data corresponding to the object;
- the providing The module is configured to provide the depth data to an application through a preset interface, so that the application calls the depth data for secure verification.
- a further embodiment of the present application provides a terminal device, including a laser camera, a floodlight, a visible light camera, a laser, and a micro control unit MCU, wherein the micro control unit MCU includes a pulse width modulation PWM, a depth engine, a preset interface, and a random access memory RAM, wherein the micro control unit MCU is configured to: generate a laser by using the pulse width modulation PWM modulation; emit the laser light to a subject through the laser light; and capture the laser through the laser camera a laser image of the subject; transmitting the laser image to the depth engine, and obtaining depth data corresponding to the object by the depth engine; and passing the depth data through the pre- An interface is provided to the application to cause the application to invoke the depth data.
- the micro control unit MCU includes a pulse width modulation PWM, a depth engine, a preset interface, and a random access memory RAM, wherein the micro control unit MCU is configured to: generate a laser by using the pulse width modulation PWM modulation; emit
- Still another embodiment of the present application provides a non-transitory computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the laser-based security verification method described in the above embodiments.
- FIG. 1 is a flow chart of a laser-based security verification method in accordance with one embodiment of the present application
- FIG. 2 is a schematic diagram of a scene of laser measurement according to an embodiment of the present application.
- FIG. 3 is a flow chart of a laser-based security verification method in accordance with another embodiment of the present application.
- FIG. 4 is a flow chart of a laser-based security verification method in accordance with yet another embodiment of the present application.
- FIG. 5 is a flowchart of a laser-based security verification method according to still another embodiment of the present application.
- FIG. 6 is a block diagram showing the structure of a laser-based security verification apparatus according to an embodiment of the present application.
- FIG. 7 is a structural block diagram of a terminal device according to an embodiment of the present application.
- FIG. 8 is a schematic diagram of an operating environment of a terminal device according to an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
- a laser-based security verification method of the present application includes the following steps:
- the depth data is provided to the application through a preset interface, so that the application calls the deep data for security verification.
- the security verification method further includes:
- the infrared image data and the depth data are provided to the application through a preset interface, so that the application calls the infrared image data and the depth data for secure verification.
- the security verification method further includes:
- S402 transmitting the visible light image and the laser image to the micro control unit MCU, and processing the visible light image and the laser image by using the micro control unit MCU to obtain the visible light image data and the depth data;
- the visible image data and the depth data are provided to the application through a preset interface, so that the application calls the visible image data and the depth data for secure verification.
- the security verification method further includes:
- the visible light image After capturing the visible light image of the subject, the visible light image is directly provided to the application for processing.
- calculating the depth data corresponding to the object by using the micro control unit MCU includes:
- the depth data corresponding to the subject is determined based on the height information.
- the security verification method further includes:
- the depth data or the infrared image data or the visible light image data is called.
- the application is under a trusted runtime environment TEE.
- the preset interface is a bus interface that conforms to a preset standard, and includes an MIPI bus interface, an I2C synchronous serial bus interface, and an SPI bus interface.
- a laser-based security verification device of the present application includes a transmitting module 610 , a capturing module 620 , a processing module 630 , and a providing module 640 .
- the transmitting module 610 is configured to emit laser light to the object;
- the capturing module 620 is configured to capture a laser image passing through the object;
- the processing module 630 is configured to send the laser image to the micro control unit MCU, and calculate and obtain the obtained by using the micro control unit MCU
- the providing module 640 is configured to provide the depth data to the application through a preset interface, so that the application calls the deep data for secure verification.
- the security verification device further includes a transmitting module 610 , a capturing module 620 , a processing module 630 , and a providing module 640 .
- the transmitting module 610 is further configured to emit infrared light and laser light to the object;
- the capturing module 620 is further configured to capture an infrared image and a laser image passing through the object;
- the processing module 630 is further configured to send the infrared image and the laser image to the micro control a unit MCU, and processing the infrared image and the laser image by using the micro control unit MCU to obtain infrared image data and depth data;
- the providing module 640 is further configured to provide the infrared image data and the depth data to the application through a preset interface, Enables the application to call infrared image data and depth data for secure verification.
- the security verification device further includes a capture module 620 , a processing module 630 , and a providing module 640 .
- the capturing module 620 is further configured to capture a visible light image of the object and capture a laser image passing through the object;
- the processing module 630 is further configured to send the visible light image and the laser image to the micro control unit MCU, and use the micro control unit MCU pair
- the visible light image and the laser image are processed to obtain visible light image data and depth data;
- the providing module 640 is further configured to provide the visible light image data and the depth data to the application through a preset interface, so that the application calls the visible image data and the depth data. Perform security verification.
- the security verification apparatus further includes a providing module 640.
- the providing module 640 is further configured to directly provide the visible light image to the application for processing after capturing the visible light image of the object.
- the processing module 630 is configured to: demodulate phase information corresponding to the deformed position pixel in the laser image; convert the phase information into height information; and determine depth data corresponding to the object according to the height information.
- the security verification device further includes an encryption module and a decryption module.
- the encryption module is configured to encrypt the depth data or the infrared image data or the visible light image data after calculating the depth data corresponding to the object or acquiring the infrared image data corresponding to the object or capturing the visible light image data; the decryption module is configured to utilize After the application decrypts the encrypted depth data or infrared image data or visible image data, the depth data or infrared image data or visible image data is called.
- the application is under a trusted runtime environment TEE.
- the preset interface is a bus interface that conforms to a preset standard, and includes an MIPI bus interface, an I2C synchronous serial bus interface, and an SPI bus interface.
- a non-transitory computer readable storage medium of the present application on which is stored a computer program that, when executed by a processor, implements the laser-based security verification method described above.
- a terminal device of the present application includes a laser camera, a floodlight, a visible light camera, a laser light, and a micro control unit MCU.
- the micro control unit MCU includes a pulse width modulation PWM, a depth engine, a preset interface, and a random access memory RAM.
- the micro control unit MCU is configured to: generate laser light by pulse width modulation PWM modulation; emit laser light to the object through a laser light; capture a laser image passing through the object through the laser camera; send the laser image to the depth engine, and The depth data corresponding to the object is obtained by the depth engine calculation; and the depth data is provided to the application through a preset interface, so that the application calls the depth data for secure verification.
- the micro control unit MCU is further configured to: emit infrared light to the object through the floodlight, and emit laser light to the object through the laser light; capture the infrared image passing through the object through the laser camera And the laser image; sending the infrared image and the laser image to the depth engine, and obtaining the infrared image data and the depth data corresponding to the object through the depth engine calculation; and providing the infrared image data and the depth data to the application through a preset interface To enable the application to call infrared image data and depth data for secure verification.
- the micro control unit MCU is further configured to: acquire a visible light image of the subject captured by the visible light camera, and capture a laser image passing through the object through the laser camera; and process the visible light image and the laser image, Obtaining visible light image data and depth data; and providing visible light image data and depth data to an application through a preset interface, so that the application calls visible image data and depth data for secure verification.
- the micro control unit MCU is specifically configured to: demodulate phase information corresponding to the deformed position pixel in the laser image; convert the phase information into height information; and determine depth data corresponding to the object according to the height information.
- the micro control unit MCU is further configured to: after calculating the depth data corresponding to the obtained object or acquiring the infrared image data corresponding to the object or capturing the visible image data, the depth data or the infrared image data Or the visible light image data is encrypted; and after the encrypted depth data or the infrared image data or the visible light image data is decrypted by the application, the depth data or the infrared image data or the visible light image data is called.
- the application is under a trusted runtime environment TEE.
- the preset interface is a bus interface that conforms to a preset standard, and includes an MIPI bus interface, an I2C synchronous serial bus interface, and an SPI bus interface.
- FIG. 1 is a flow chart of a laser based security verification method in accordance with one embodiment of the present application.
- the laser-based security verification method includes:
- face recognition technology has been widely used in scenarios such as identity authentication and mobile payment.
- the user when logging in an APP, the user can first turn on the camera, use the camera to obtain the face image of the user, analyze the face image, extract the features of the face, and compare with the pre-existing face features. If the two match, the authentication passes and the user is allowed to log in. After this, the user can perform further operations on the APP.
- the current face image acquired based on the camera is mainly a two-dimensional image, and it is difficult to distinguish the difference between the real face and the photo, and it is easy to be cracked.
- the authentication process is mainly implemented at the application level, and the operating system (such as the Android system) is also an open source system, and the security is not high.
- the present application proposes a laser-based security verification method, which uses laser to acquire stereoscopic three-dimensional information, which is not easily replaced by photos and has higher security than the planar information of the two-dimensional image.
- saving the processed data into a hardware micro controller unit is safer than saving it in an application.
- the MCU may include Pulse Width Modulation (PWM), a depth engine, a preset interface, and a random access memory RAM.
- a laser can be emitted to the subject.
- the structured light can be generated by Pulse Width Modulation (PWM) modulation in the MCU, and the structured light is emitted to the object by a laser (structured light projection device), specifically, the light emitted by the laser light is The laser light, thus the structured light emitted by the laser light to the object is a laser, and the structured light generated by the PWM modulation is also a laser.
- PWM Pulse Width Modulation
- the laser after the laser is irradiated to the object, the laser is deformed due to the shape characteristic of the object, and by collecting the laser information, a structured light having a subject contour and depth can be obtained.
- the image in particular, since the structured light image is obtained by acquiring laser information, and the structured light image represents laser information, the structured light image can be understood as a laser image.
- the type of structured light may include laser stripes, Gray code, sinusoidal stripes, or non-uniform speckles and the like.
- the following is an example of a widely used fringe projection technique, in which the strip projection technique belongs to a planar light (or laser) in a broad sense.
- a sinusoidal stripe is generated by PWM, and the sinusoidal stripe is projected to a subject by a laser (laser projection device), and the degree of curvature of the stripe modulated by the object is photographed by the laser camera.
- the curved stripe is demodulated to obtain the phase, and the phase is converted to the height of the full field.
- the laser used in the embodiment of the present application may be any other pattern in addition to the above-mentioned stripes, depending on the specific application scenario.
- the laser image can be sent to the MCU, and the laser image is processed in the MCU of the hardware. Compared with the processing directly sent to the application, the data is already calculated in the hardware, and the hacker cannot obtain the original data. safer.
- the depth engine in the MCU (for calculating the depth of field data in the laser image) can be used to demodulate the phase information corresponding to the pixel of the deformed position in the laser image, and then the phase information is converted into the height information, and finally the photograph is determined according to the height information.
- Depth of field data corresponding to the object Since the laser image has the contour and depth information of the object, the depth of field data is obtained by calculating the information in the laser image by the depth engine, and the depth of field data corresponds to the height information of the object, the depth of field data can also be understood as the depth data.
- the depth data is provided to the application through a preset interface, so that the application calls the deep data for security verification.
- the preset interface is a bus interface that conforms to a preset standard, and includes a MIPI (Mobile Industry Processor Interface) bus interface, an I2C synchronous serial bus interface, and an SPI bus interface.
- MIPI Mobile Industry Processor Interface
- the depth data calculated by the depth engine may be provided to the application through a preset interface. Since the above bus interface conforms to the security protocol and the application is in the Trusted Execution Environment (TEE), the application can safely call the deep data for security verification. For example, based on the laser image of the face, data such as the contour and height of the face are calculated. The above data information has been calculated in the MCU, and the application only needs to invoke the above data information to perform feature comparison with the pre-stored data to implement identity verification. If the verification is passed, the user can gain access to the application and take the application further.
- TEE Trusted Execution Environment
- the laser-based security verification method of the embodiment of the present application by emitting laser light to a subject, capturing a laser image passing through the object, and transmitting the laser image to the micro control unit MCU, and using the micro control unit MCU to calculate and obtain
- the depth data corresponding to the camera is then provided to the application through the preset interface, so that the application calls the deep data for security verification, and the MCU of the hardware protects the data, preventing the user from being stolen and improving security. Sex.
- FIG. 3 is a flow chart of a laser based security verification method in accordance with another embodiment of the present application.
- laser-based security verification methods include:
- laser light can be generated using PWM modulation in an MCU, laser light is emitted by a laser light, and infrared light is emitted to a subject through a floodlight (infrared light emitter).
- an infrared image and a laser image passing through the subject may be captured by a laser camera (infrared light receiver).
- the infrared image and the laser image are sent to the micro control unit MCU, and the infrared image and the laser image are processed by the micro control unit MCU to obtain the infrared image data and the depth data.
- the infrared image and the laser image may be processed using a depth engine in the MCU to acquire infrared image data and depth data.
- the infrared image data and the depth data are provided to the application through a preset interface, so that the application calls the infrared image data and the depth data for secure verification.
- the embodiment combines the infrared image and the laser image, transmits the above information to the MCU of the hardware for processing, and then provides the processed infrared image data and depth data to the trusted operating environment.
- the application is authenticated.
- the infrared image data may be used for living body detection, and when the current object is detected as a living body, the depth data is used for further identity verification.
- the process of using the deep data to perform the authentication is consistent with the description of the previous embodiment, and is not described in this embodiment.
- the laser-based security verification method of the embodiment of the present application transmits infrared light and laser light to a subject, captures an infrared image and a laser image passing through the object, and transmits the infrared image and the laser image to the micro control unit MCU. And using the micro control unit MCU to process the infrared image and the laser image to obtain infrared image data and depth data, and provide the infrared image data and the depth data to the application through a preset interface, so that the application calls the infrared image data and The depth data is used for security verification, and the infrared image and the laser image are combined and placed in the MCU for protection, thereby preventing the user's information from being stolen and further improving security.
- FIG. 4 is a flow chart of a laser based security verification method in accordance with yet another embodiment of the present application.
- laser-based security verification methods include:
- a laser can be generated using PWM modulation in an MCU to emit laser light through a laser.
- the laser image of the subject is captured by the laser camera.
- a visible light image of the subject is taken by the visible light camera.
- the visible light camera is a camera for taking photos and recording color information.
- the visible light image and the laser image are sent to the micro control unit MCU, and the visible light image and the laser image are processed by the micro control unit MCU to obtain visible light image data and depth data.
- the visible light image and the laser image may be processed using a depth engine in the MCU to acquire visible light image data and depth data.
- the visible image data and the depth data are provided to the application through a preset interface, so that the application calls the visible image data and the depth data for secure verification.
- the present embodiment combines the visible light image and the laser image, transmits the above information to the MCU of the hardware for processing, and then provides the processed visible light image data and depth data to the trusted operating environment.
- the app is authenticated.
- the laser-based security verification method of the embodiment of the present application captures a visible light image of a subject, captures a laser image passing through the object, and transmits the visible light image and the laser image to the micro control unit MCU, and utilizes the micro control unit
- the MCU processes the visible light image and the laser image to obtain visible light image data and depth data, and provides visible image data and depth data to the application through a preset interface, so that the application calls visible image data and depth data for secure verification.
- Infrared images and laser images are placed in the MCU for protection, preventing user information from being stolen and improving security; and combining visible light images with laser images to describe features more accurately and improve the accuracy of identity verification.
- the security level requirements of some applications are not particularly high, it is not required that both the visible light image and the laser image are calculated in the MCU. Therefore, in the case of ensuring certain security, after capturing the visible light image of the subject, the visible light image can be directly provided to the application in the trusted operating environment for processing, and the laser image is still processed by the MCU to reduce the MCU. The computational burden increases processing speed.
- the laser-based security verification method may further include the following steps:
- the depth data or the infrared image data or the visible light image data is encrypted.
- the depth data or the infrared image data or the visible light image data is called.
- the encryption can also be performed in the MCU, and the application can be securely provided to the application in the trusted operating environment through the MIPI bus interface conforming to the security protocol, and the application can access the data.
- Decrypt After the decryption is successful, the application calls the decrypted data for further operations, thereby improving security.
- FIG. 6 is a structural block diagram of a laser-based security verification device according to an embodiment of the present application. As shown in FIG. 6, the device includes a transmission. Module 610, capture module 620, processing module 630, and providing module 640.
- the transmitting module 610 is configured to emit laser light to the object.
- the capturing module 620 is configured to capture a laser image passing through the object.
- the processing module 630 is configured to send the laser image to the micro control unit MCU, and calculate the depth data corresponding to the object by using the micro control unit MCU.
- a module 640 is provided for providing depth data to the application through a preset interface, so that the application calls the deep data for secure verification.
- the laser-based security verification apparatus of the embodiment of the present application obtains a laser beam by emitting a laser to a subject, captures a laser image passing through the object, and transmits the laser image to the micro control unit MCU, and calculates the obtained by using the micro control unit MCU.
- the depth data corresponding to the camera is then provided to the application through the preset interface, so that the application calls the deep data for security verification, and the MCU of the hardware protects the data, preventing the user from being stolen and improving security. Sex.
- the present application also proposes a terminal device.
- the terminal device 700 includes a laser camera 710, a floodlight 720, a visible light camera 730, a laser light 740, and a micro control unit MCU 750.
- the laser camera 710, the floodlight 720, the visible light camera 730, and the laser light 740 are connected to the MCU 750, respectively.
- the micro control unit MCU 750 includes a pulse width modulation PWM 751, a depth engine 752, a preset interface 753, and a random access memory RAM 754.
- the micro control unit MCU750 is specifically used to:
- the laser light is modulated by the pulse width modulation PWM 751, and then the laser light is emitted to the object by the laser lamp 740.
- the laser image passing through the subject is captured by the laser camera 710, and the laser image is sent to the depth engine 752, and the depth data corresponding to the object is obtained by the depth engine 752.
- the depth data is provided to the application via the preset interface 753 to enable the application to call the deep data for secure verification.
- the laser pattern may be a laser stripe, a Gray code, a sine stripe or a randomly arranged speckle pattern.
- the preset interface 753 is a bus interface conforming to a preset standard, and includes a MIPI (Mobile Industry Processor Interface) bus interface, an I2C synchronous serial bus interface, and an SPI bus interface.
- MIPI Mobile Industry Processor Interface
- the visible light camera 730 includes an image sensor and a lens, and the visible light camera 730 can be used to capture color information of the current user to obtain a scene image, wherein the image sensor includes a color filter array (such as a Bayer filter array), and the number of lenses can be one or Multiple.
- the visible light camera 730 in the process of acquiring the scene image, each image pixel in the image sensor senses light intensity and wavelength information from the shooting scene to generate a set of original image data; the image sensor sends the set of original image data to the MCU 750, The MCU 750 performs denoising, interpolation, and the like on the original image data to obtain a colored scene image.
- the MCU 750 can process each image pixel in the original image data one by one in a plurality of formats, for example, each image pixel can have a bit depth of 8, 10, 12 or 14 bits, and the MCU 750 can have the same or different bit depths for each An image pixel is processed. It should be understood that in some embodiments, the scene image may be directly provided to an application in a trusted operating environment for processing without increasing the processing speed through the MCU 750.
- the application can be Securely call deep data for secure verification. For example, based on the laser image of the face, data such as the contour and height of the face are calculated. The above data information has been calculated in the MCU 750, and the application only needs to invoke the above data information in a trusted operating environment, and perform feature comparison with the pre-stored data to implement identity verification. If the verification is passed, the user can gain access to the application and take the application further.
- the trusted operating environment TEE is relative to the normal running environment. Generally, the trusted operating environment performs some highly secure operations such as authentication, payment authorization, etc., which is more secure than the normal running environment.
- the terminal device of the embodiment of the present application transmits laser light to the object, captures a laser image passing through the object, and transmits the laser image to the micro control unit MCU 750, and calculates the corresponding object by using the micro control unit MCU 750.
- the depth data is then provided to the application through the preset interface 753, so that the application calls the deep data for security verification, and the hardware MCU 750 protects the data, preventing the user's information from being stolen and improving security.
- micro control unit MCU 750 can also be used to:
- the laser light is emitted by the laser lamp 740, and the infrared light is emitted to the object through the floodlight 720.
- the infrared image and the laser image passing through the subject are captured by the laser camera 710.
- the infrared image and the laser image are then processed using depth engine 752 to obtain infrared image data and depth data.
- the infrared image data and the depth data are provided to the application through the preset interface 753, so that the application calls the infrared image data and the depth data for secure verification.
- the embodiment combines the infrared image and the laser image, transmits the above information to the MCU 750 of the hardware for processing, and then provides the processed infrared image data and depth data to the trusted operating environment.
- the application is authenticated.
- the combination of the infrared image and the laser image is placed in the MCU 750 for protection, preventing the user's information from being stolen, further improving security.
- the infrared image data may be used for living body detection, and when the current object is detected as a living body, the depth data is used for further identity verification.
- micro control unit MCU 750 can also be used to:
- the laser light is generated by PWM 751 modulation, and the laser light is emitted by the laser lamp 740.
- the laser image passing through the subject is captured by the laser camera 710.
- a visible light image of the subject is taken by the visible light camera 730.
- the visible light image and the laser image are processed by the depth engine 752 to acquire visible light image data and depth data.
- the visible light image data and the depth data are provided to the application through the preset interface 753, so that the application calls the visible image data and the depth data for secure verification.
- the security level requirements of some applications are not particularly high, and neither visible light images nor laser images are required to be processed in the MCU 750. For this reason, after ensuring a certain security, after capturing the visible light image of the subject, the visible light image can be directly provided to the application in the trusted operating environment for processing without going through the MCU 750. The laser image is still processed by the MCU 750, which reduces the computational burden of the MCU 750 and increases the processing speed.
- the terminal device 800 of the embodiment of the present application includes one or more processors 810, a memory 820, and one or more programs 801.
- One or more of the programs 801 are stored in the memory 820 and are configured to be executed by one or more processors 810.
- Program 801 includes instructions for performing the laser based secure verification method of any of the above embodiments.
- the program 801 includes instructions for performing a laser-based secure verification method of the following steps:
- S102' captures a laser image passing through the subject.
- the laser image is sent to the micro control unit MCU, and the depth data corresponding to the object is obtained by using the micro control unit MCU.
- the depth data is provided to the application through a preset interface, so that the application calls the deep data for security verification.
- the present application further provides a non-transitory computer readable storage medium having stored thereon a computer program, characterized in that the program is executed by the processor to implement the laser-based security of the first aspect of the embodiment. Authentication method.
- first and second are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated.
- features defining “first” or “second” may include at least one of the features, either explicitly or implicitly.
- the meaning of "a plurality” is at least two, such as two, three, etc., unless specifically defined otherwise.
- a "computer-readable medium” can be any apparatus that can contain, store, communicate, propagate, or transport a program for use in an instruction execution system, apparatus, or device, or in conjunction with the instruction execution system, apparatus, or device.
- computer readable media include the following: electrical connections (electronic devices) having one or more wires, portable computer disk cartridges (magnetic devices), random access memory (RAM), Read only memory (ROM), erasable editable read only memory (EPROM or flash memory), fiber optic devices, and portable compact disk read only memory (CDROM).
- the computer readable medium may even be a paper or other suitable medium on which the program may be printed, as it may be optically scanned, for example by paper or other medium, followed by editing, interpretation or, if appropriate, in other suitable manners. Processing to obtain the program electronically and then storing it in computer memory.
- portions of the application can be implemented in hardware, software, firmware, or a combination thereof.
- multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
- a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
- each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
- An integrated module can also be stored in a computer readable storage medium if it is implemented as a software functional module and sold or used as a standalone product.
- the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like. While the embodiments of the present application have been shown and described above, it is understood that the above-described embodiments are illustrative and are not to be construed as limiting the scope of the present application. The embodiments are subject to variations, modifications, substitutions and variations.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Studio Devices (AREA)
- Length Measuring Devices By Optical Means (AREA)
Abstract
一种基于激光的安全验证方法、装置、终端设备及可读存储介质。基于激光的安全验证方法包括:向被摄物发射激光(S101);捕获经过所述被摄物的激光图像(S102);将所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU计算获得所述被摄物对应的深度数据(S103);以及,将所述深度数据通过预设接口提供至应用程序,以使所述应用程序调用所述深度数据进行安全验证(S104)。
Description
优先权信息
本申请请求2018年04月12日向中国国家知识产权局提交的、专利申请号为201810327898.1的专利申请的优先权和权益,并且通过参照将其全文并入此处。
本申请涉及信息处理技术领域,尤其涉及一种基于激光的安全验证方法、装置及终端设备。
随着科技的不断进步,生物识别技术的应用也越来越广泛,尤其是人脸识别,已广泛应用于身份认证、移动支付等场景。例如,用户需要登录一个安全应用程序(理财APP)时,可通过该应用程序开启人脸识别功能,获取用户的人脸信息,与预存的人脸信息比对。如果比对一致,则认证通过,用户登录成功。
发明内容
本申请提供一种基于激光的安全验证方法、装置及终端设备,以提高应用程序调用数据时的安全性。
本申请实施例提供一种基于激光的安全验证方法,包括:向被摄物发射激光;捕获经过所述被摄物的激光图像;将所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU计算获得所述被摄物对应的深度数据;以及,将所述深度数据通过预设接口提供至应用程序,以使所述应用程序调用所述深度数据进行安全验证。
本申请另一实施例提供一种基于激光的安全验证装置,包括发射模块、捕获模块、处理模块以及提供模块;所述发射模块用于向被摄物发射激光;所述捕获模块用于捕获经过所述被摄物的激光图像;所述处理模块用于将所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU计算获得所述被摄物对应的深度数据;所述提供模块用于将所述深度数据通过预设接口提供至应用程序,以使所述应用程序调用所述深度数据进行安全验证。
本申请又一实施例提供一种终端设备,包括激光摄像头、泛光灯、可见光摄像头、镭射灯以及微控制单元MCU,所述微控制单元MCU包括脉冲宽度调制PWM、深度引擎、预设接口以及随机存取存储器RAM,其中,所述微控制单元MCU,用于:利用所述脉冲宽度调制PWM调制生成激光;通过所述镭射灯向被摄物发射所述激光;通过所述激光摄像头捕获经过所述被摄物的激光图像;将所述激光图像发送至所述深度引擎,并通过所述 深度引擎计算获得所述被摄物对应的深度数据;以及,将所述深度数据通过所述预设接口提供至应用程序,以使所述应用程序调用所述深度数据。
本申请还一实施例提供一种非临时性计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现上述实施例所述的基于激光的安全验证方法。
本申请附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。
本申请上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1是根据本申请一个实施例的基于激光的安全验证方法的流程图;
图2是根据本申请一个实施例的激光测量的场景示意图;
图3是根据本申请另一个实施例的基于激光的安全验证方法的流程图;
图4是根据本申请又一个实施例的基于激光的安全验证方法的流程图;
图5是根据本申请再一个实施例的基于激光的安全验证方法的流程图;
图6是根据本申请一个实施例的基于激光的安全验证装置的结构框图;
图7是根据本申请一个实施例的终端设备的结构框图;
图8是根据本申请一个实施例的终端设备的运行环境的示意图;
图9是根据本申请一个实施例的终端设备的结构示意图。
下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本申请,而不能理解为对本申请的限制。
请参阅图1,本申请的一种基于激光的安全验证方法,包括以下步骤:
S101,向被摄物发射激光;
S102,捕获经过被摄物的激光图像;
S103,将激光图像发送至微控制单元MCU,并利用微控制单元MCU计算获得被摄物对应的深度数据;以及
S104,将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证。
请参阅图3,在某些实施方式中,安全验证方法还包括:
S301,向被摄物发射红外光和激光;
S302,捕获经过被摄物的红外图像和激光图像;
S303,将红外图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对红外图像和激光图像进行处理,以获取红外图像数据和深度数据;以及
S304,将红外图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用红外图像数据和深度数据进行安全验证。
请参阅图4,在某些实施方式中,安全验证方法还包括:
S401,拍摄被摄物的可见光图像,并捕获经过被摄物的激光图像;
S402,将可见光图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对可见光图像和激光图像进行处理,以获取可见光图像数据和深度数据;以及
S403,将可见光图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用可见光图像数据和深度数据进行安全验证。
在某些实施方式中,安全验证方法还包括:
在拍摄被摄物的可见光图像之后,直接将可见光图像提供给应用程序进行处理。
在某些实施方式中,利用微控制单元MCU计算获得被摄物对应的深度数据,包括:
解调激光图像中变形位置像素对应的相位信息;
将相位信息转化为高度信息;
根据高度信息确定被摄物对应的深度数据。
请参阅图5,在某些实施方式中,安全验证方法还包括:
S501,在计算获得被摄物对应的深度数据或获取被摄物对应的红外图像数据或拍摄可见光图像数据之后,对深度数据或红外图像数据或可见光图像数据进行加密;
S502,利用应用程序对加密后的深度数据或红外图像数据或可见光图像数据进行解密之后,调用深度数据或红外图像数据或可见光图像数据。
在某些实施方式中,应用程序处于可信运行环境TEE下。
在某些实施方式中,预设接口为符合预设标准的总线接口,包括MIPI总线接口、I2C同步串行总线接口、SPI总线接口。
请参阅图6,本申请的一种基于激光的安全验证装置,包括发射模块610、捕获模块620、处理模块630以及提供模块640。发射模块610用于向被摄物发射激光;捕获模块620用于捕获经过被摄物的激光图像;处理模块630用于将激光图像发送至微控制单元MCU,并利用微控制单元MCU计算获得被摄物对应的深度数据;提供模块640用于将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证。
请参阅图6,在某些实施方式中,安全验证装置还包括发射模块610、捕获模块620、 处理模块630以及提供模块640。发射模块610还用于向被摄物发射红外光和激光;捕获模块620还用于捕获经过被摄物的红外图像和激光图像;处理模块630还用于将红外图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对红外图像和激光图像进行处理,以获取红外图像数据和深度数据;提供模块640还用于将红外图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用红外图像数据和深度数据进行安全验证。
请参阅图6,在某些实施方式中,安全验证装置还包括捕获模块620、处理模块630以及提供模块640。捕获模块620还用于拍摄被摄物的可见光图像,并捕获经过被摄物的激光图像;处理模块630还用于将可见光图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对可见光图像和激光图像进行处理,以获取可见光图像数据和深度数据;提供模块640还用于将可见光图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用可见光图像数据和深度数据进行安全验证。
请参阅图6,在某些实施方式中,安全验证装置还包括提供模块640,提供模块640还用于在拍摄被摄物的可见光图像之后,直接将可见光图像提供给应用程序进行处理。
在某些实施方式中,处理模块630用于:解调激光图像中变形位置像素对应的相位信息;将相位信息转化为高度信息;以及,根据高度信息确定被摄物对应的深度数据。
在某些实施方式中,安全验证装置还包括加密模块和解密模块。加密模块用于在计算获得被摄物对应的深度数据或获取被摄物对应的红外图像数据或拍摄可见光图像数据之后,对深度数据或红外图像数据或可见光图像数据进行加密;解密模块用于利用应用程序对加密后的深度数据或红外图像数据或可见光图像数据进行解密之后,调用深度数据或红外图像数据或可见光图像数据。
在某些实施方式中,应用程序处于可信运行环境TEE下。
在某些实施方式中,预设接口为符合预设标准的总线接口,包括MIPI总线接口、I2C同步串行总线接口、SPI总线接口。
本申请的一种非临时性计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述的基于激光的安全验证方法。
本申请的一种终端设备,包括激光摄像头、泛光灯、可见光摄像头、镭射灯以及微控制单元MCU,微控制单元MCU包括脉冲宽度调制PWM、深度引擎、预设接口以及随机存取存储器RAM,其中,微控制单元MCU,用于:利用脉冲宽度调制PWM调制生成激光;通过镭射灯向被摄物发射激光;通过激光摄像头捕获经过被摄物的激光图像;将激光图像发送至深度引擎,并通过深度引擎计算获得被摄物对应的深度数据;以及,将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证。
在某些实施方式中,微控制单元MCU,还用于:通过泛光灯向被摄物发射红外光,并 通过镭射灯向被摄物发射激光;通过激光摄像头捕获经过被摄物的红外图像和激光图像;将红外图像和激光图像发送至深度引擎,并通过深度引擎计算获得被摄物对应的红外图像数据和深度数据;以及,将红外图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用红外图像数据和深度数据进行安全验证。
在某些实施方式中,微控制单元MCU,还用于:获取可见光摄像头拍摄的被摄物的可见光图像,并通过激光摄像头捕获经过被摄物的激光图像;对可见光图像和激光图像进行处理,以获取可见光图像数据和深度数据;以及,将可见光图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用可见光图像数据和深度数据进行安全验证。
在某些实施方式中,微控制单元MCU,具体用于:解调激光图像中变形位置像素对应的相位信息;将相位信息转化为高度信息;根据高度信息确定被摄物对应的深度数据。
在某些实施方式中,微控制单元MCU,还用于:在计算获得被摄物对应的深度数据或获取被摄物对应的红外图像数据或拍摄可见光图像数据之后,对深度数据或红外图像数据或可见光图像数据进行加密;以及,利用应用程序对加密后的深度数据或红外图像数据或可见光图像数据进行解密之后,调用深度数据或红外图像数据或可见光图像数据。
在某些实施方式中,应用程序处于可信运行环境TEE下。
在某些实施方式中,预设接口为符合预设标准的总线接口,包括MIPI总线接口、I2C同步串行总线接口、SPI总线接口。
下面参考附图描述本申请实施例的基于激光的安全验证方法、装置及终端设备。
图1是根据本申请一个实施例的基于激光的安全验证方法的流程图。
如图1所示,该基于激光的安全验证方法包括:
S101,向被摄物发射激光。
目前,人脸识别技术已广泛应用于身份认证、移动支付等场景。例如,用户在登录某个APP时,首先可开启摄像头,利用摄像头获取用户的人脸图像,再对人脸图像进行分析,提取人脸的特征,与预存的人脸特征进行比对。如果两者比对一致,则认证通过,允许用户登录。在此之后,用户可对该APP进行更进一步地操作。但是,当前基于摄像头获取的人脸图像,主要为二维图像,很难区分出真正的人脸与照片的区别,很容易被破解。并且,该认证过程主要在应用层面实现,且操作系统(如Android系统)也是开源的系统,安全性不高,一旦系统被黑客入侵,应用程序中用户的信息也存在被盗的风险。为此,本申请提出一种基于激光的安全验证方法,利用激光来获取到立体的三维信息,相对于二维图像的平面信息,不容易被照片代替,安全性更高。并且,将处理获得的数据保存入一个硬件的微控制单元(MCU,Micro Controller Unit)中,相比于保存在应用程序中更加安全。其中,MCU可包括脉冲宽度调制(PWM,Pulse Width Modulation)、深度引擎、预设接口以 及随机存取存储器RAM。
在本申请的一个实施例中,可向被摄物发射激光。具体地,可利用MCU中的脉冲宽度调制(PWM,Pulse Width Modulation)调制生成结构光,通过镭射灯(结构光投影设备)向被摄物发射结构光,具体地,由于镭射灯发出的光为激光,因而镭射灯向被摄物发射的结构光为激光,PWM调制生成的结构光也为激光。假设当前场景为身份验证场景,则被摄物可以是用户的人脸。
S102,捕获经过被摄物的激光图像。
在本申请的一个实施例中,激光在照射到被摄物后,由于被摄物的形状特性,激光会发生形变,通过采集上述激光信息,可以得到一个具有被摄物轮廓和深度的结构光图像,具体地,由于结构光图像通过采集激光信息得到,并且结构光图像体现的是激光信息,因而结构光图像可以理解为激光图像。
其中,结构光的类型(或激光的类型)可包括,激光条纹、格雷码、正弦条纹、或者,非均匀散斑等。
下面以一种应用广泛的条纹投影技术为例来阐述其具体原理,其中,条形投影技术属于广义上的面结构光(或激光)。
在使用面激光投影的时候,如图2所示,通过PWM产生正弦条纹,将该正弦条纹通过镭射灯(激光投影设备)投影至被摄物,利用激光摄像头拍摄条纹受物体调制的弯曲程度,解调该弯曲条纹得到相位,再将相位转化为全场的高度。
应当理解的是,在实际应用中,根据具体应用场景的不同,本申请实施例中所采用的激光除了上述条纹之外,还可以是其他任意图案。
S103,将激光图像发送至微控制单元MCU,并利用微控制单元MCU计算获得被摄物对应的深度数据。
为了进一步提高安全性,可将激光图像发送至MCU,在硬件的MCU中对激光图像进行处理,相比于直接发送给应用程序处理,数据已经在硬件中运算,黑客无法获取原始的数据,因此更加安全。
具体地,可利用MCU中的深度引擎(用于计算激光图像中景深数据),解调激光图像中变形位置像素对应的相位信息,然后将相位信息转化为高度信息,最后根据高度信息确定被摄物对应的景深数据。由于激光图像具有被摄物的轮廓和深度信息、景深数据通过深度引擎计算激光图像中的信息得到、并且景深数据与被摄物的高度信息对应,因而景深数据也可以理解为深度数据。
S104,将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证。
其中,预设接口为符合预设标准的总线接口,包括MIPI(移动产业处理器接口,Mobile Industry Processor Interface)总线接口、I2C同步串行总线接口、SPI总线接口。
在本申请的一个实施例中,可将深度引擎计算得到的深度数据通过预设接口提供至应用程序。由于上述总线接口符合安全协议,且应用程序处于可信运行环境(TEE,Trust Execution Environment)下,因此应用程序可安全地调用深度数据,从而进行安全验证。例如:基于人脸的激光图像,计算得到人脸的轮廓、高度等数据信息。上述数据信息已经在MCU中计算,应用程序只需调用上述数据信息,与预存的数据进行特征比对,即可实现身份验证。如果验证通过,用户就可以获取该应用程序的权限,对应用程序进行更进一步地操作。
本申请实施例的基于激光的安全验证方法,通过向被摄物发射激光,并捕获经过被摄物的激光图像,以及将激光图像发送至微控制单元MCU,并利用微控制单元MCU计算获得被摄物对应的深度数据,然后将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证,利用硬件的MCU对数据进行保护,防止用户的信息被盗取,提升安全性。
图3是根据本申请另一个实施例的基于激光的安全验证方法的流程图。
如图3所示,基于激光的安全验证方法包括:
S301,向被摄物发射红外光和激光。
在本申请的一个实施例中,可利用MCU中的PWM调制生成激光,通过镭射灯发射激光,并通过泛光灯(红外光发射器)向被摄物发射红外光。
S302,捕获经过被摄物的红外图像和激光图像。
在本申请的一个实施例中,可通过激光摄像头(红外光接收器)捕获经过被摄物的红外图像和激光图像。
S303,将红外图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对红外图像和激光图像进行处理,以获取红外图像数据和深度数据。
具体地,可利用MCU中的深度引擎对红外图像和激光图像进行处理,以获取红外图像数据和深度数据。
S304,将红外图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用红外图像数据和深度数据进行安全验证。
为了进一步提高验证的安全性,本实施例将红外图像和激光图像结合,将上述信息传输至硬件的MCU中进行处理,再将处理后的红外图像数据和深度数据提供至可信运行环境下的应用程序进行身份验证。举例来说,可先利用红外图像数据进行活体检测,检测到当前被摄物为活体时,再利用深度数据进行进一步地身份验证。其中,利用深度数据进行 身份验证过程与上一实施例描述一致,本实施例中不再赘述。
本申请实施例的基于激光的安全验证方法,通过向被摄物发射红外光和激光,并捕获经过被摄物的红外图像和激光图像,以及将红外图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对红外图像和激光图像进行处理,以获取红外图像数据和深度数据,以及将红外图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用红外图像数据和深度数据进行安全验证,将红外图像和激光图像结合均放入MCU进行保护,防止用户的信息被盗取,进一步提升安全性。
图4是根据本申请又一个实施例的基于激光的安全验证方法的流程图。
如图4所示,基于激光的安全验证方法包括:
S401,拍摄被摄物的可见光图像,并捕获经过被摄物的激光图像。
在本申请的一个实施例中,可利用MCU中的PWM调制生成激光,通过镭射灯发射激光。再由激光摄像头捕获经过被摄物的激光图像。由可见光摄像头拍摄被摄物的可见光图像。其中,可见光摄像头即用于拍摄照片,可记录色彩信息的摄像头。
S402,将可见光图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对可见光图像和激光图像进行处理,以获取可见光图像数据和深度数据。
具体地,可利用MCU中的深度引擎对可见光图像和激光图像进行处理,以获取可见光图像数据和深度数据。
S403,将可见光图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用可见光图像数据和深度数据进行安全验证。
为了进一步提高身份验证的准确性,本实施例将可见光图像和激光图像结合,将上述信息传输至硬件的MCU中进行处理,再将处理后的可见光图像数据和深度数据提供至可信运行环境下的应用程序进行身份验证。通过将可见光图像和激光图像结合,能够获取更丰富的被摄物的特征信息,如色彩、位置等,相对于激光图像,描述特征更加准确,提高身份验证的准确性。
本申请实施例的基于激光的安全验证方法,通过拍摄被摄物的可见光图像,并捕获经过被摄物的激光图像,以及将可见光图像和激光图像发送至微控制单元MCU,并利用微控制单元MCU对可见光图像和激光图像进行处理,以获取可见光图像数据和深度数据,以及将可见光图像数据和深度数据通过预设接口提供给应用程序,以使应用程序调用可见光图像数据和深度数据进行安全验证,将红外图像和激光图像均放入MCU进行保护,防止用户的信息被盗取,提升安全性;并且将可见光图像和激光图像结合,描述特征更加准确,提高身份验证的准确性。
在本申请的另一个实施例中,由于某些应用程序的安全级别要求并不是特别高,并不 需要可见光图像和激光图像均在MCU中进行计算。为此,在保证一定安全性的情况下,在拍摄被摄物的可见光图像之后,可直接将可见光图像提供给可信运行环境下的应用程序进行处理,激光图像还是由MCU进行处理,减轻MCU的计算负担,提升处理速度。
在本申请的再一个实施例中,如图5所示,基于激光的安全验证方法还可包括以下步骤:
S501,在计算获得被摄物对应的深度数据或获取被摄物对应的红外图像数据或拍摄可见光图像数据之后,对深度数据或红外图像数据或可见光图像数据进行加密。
S502,利用应用程序对加密后的深度数据或红外图像数据或可见光图像数据进行解密之后,调用深度数据或红外图像数据或可见光图像数据。
在利用MCU中的深度引擎计算获得上述数据之后,还可在MCU中进行加密,通过符合安全协议的MIPI总线接口等,安全地提供至可信运行环境下的应用程序,由应用程序对上述数据进行解密。解密成功后,再由应用程序调用解密后的数据进行进一步地操作,从而提升安全性。
为了实现上述实施例,本申请还提出了一种基于激光的安全验证装置,图6是根据本申请一个实施例的基于激光的安全验证装置的结构框图,如图6所示,该装置包括发射模块610、捕获模块620、处理模块630和提供模块640。
其中,发射模块610,用于向被摄物发射激光。
捕获模块620,用于捕获经过被摄物的激光图像。
处理模块630,用于将激光图像发送至微控制单元MCU,并利用微控制单元MCU计算获得被摄物对应的深度数据。
提供模块640,用于将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证。
需要说明的是,前述对基于激光的安全验证方法的解释说明,也适用于本申请实施例的基于激光的安全验证装置,本申请实施例中未公布的细节,在此不再赘述。
本申请实施例的基于激光的安全验证装置,通过向被摄物发射激光,并捕获经过被摄物的激光图像,以及将激光图像发送至微控制单元MCU,并利用微控制单元MCU计算获得被摄物对应的深度数据,然后将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证,利用硬件的MCU对数据进行保护,防止用户的信息被盗取,提升安全性。
为了实现上述实施例,本申请还提出了一种终端设备。
如图7及图8所示,终端设备700包括激光摄像头710、泛光灯720、可见光摄像头730、镭射灯740以及微控制单元MCU750。激光摄像头710、泛光灯720、可见光摄像头 730、镭射灯740分别于MCU750相连。其中,微控制单元MCU750包括脉冲宽度调制PWM751、深度引擎752、预设接口753以及随机存取存储器RAM754。
微控制单元MCU750,具体用于:
利用脉冲宽度调制PWM751调制生成激光,然后通过镭射灯740向被摄物发射激光。再通过激光摄像头710捕获经过被摄物的激光图像,并将激光图像发送至深度引擎752,并通过深度引擎752计算获得被摄物对应的深度数据。最后,将深度数据通过预设接口753提供至应用程序,以使应用程序调用深度数据进行安全验证。其中,激光图案可以是激光条纹、格雷码、正弦条纹或者随机排列的散斑图案等。预设接口753为符合预设标准的总线接口,包括MIPI(移动产业处理器接口,Mobile Industry Processor Interface)总线接口、I2C同步串行总线接口、SPI总线接口。
可见光摄像头730包括图像传感器和透镜,可见光摄像头730可用于捕捉当前用户的彩色信息以获得场景图像,其中,图像传感器包括彩色滤镜阵列(如Bayer滤镜阵列),透镜的个数可为一个或多个。可见光摄像头730在获取场景图像过程中,图像传感器中的每一个成像像素感应来自拍摄场景中的光强度和波长信息,生成一组原始图像数据;图像传感器将该组原始图像数据发送至MCU750中,MCU750对原始图像数据进行去噪、插值等运算后即得到彩色的场景图像。MCU750可按多种格式对原始图像数据中的每个图像像素逐一处理,例如,每个图像像素可具有8、10、12或14比特的位深度,MCU750可按相同或不同的位深度对每一个图像像素进行处理。应当理解的是,在某些实施例中,场景图像可直接提供给可信运行环境下的应用程序进行处理,无需经过MCU750,提升处理速度。
在本申请的一个实施例中,如图8所示,由于预设接口753为符合预设标准的总线接口,且应用程序处于可信运行环境(TEE,Trust Execution Environment)下,因此应用程序可安全地调用深度数据,从而进行安全验证。例如:基于人脸的激光图像,计算得到人脸的轮廓、高度等数据信息。上述数据信息已经在MCU750中计算,应用程序只需在可信运行环境下调用上述数据信息,与预存的数据进行特征比对,即可实现身份验证。如果验证通过,用户就可以获取该应用程序的权限,对应用程序进行更进一步地操作。其中,可信运行环境TEE是相对于普通运行环境来说的,通常可信运行环境下执行的是一些安全性较高的操作诸如身份验证、支付授权等,相对于普通运行环境更加安全。
本申请实施例的终端设备,通过向被摄物发射激光,并捕获经过被摄物的激光图像,以及将激光图像发送至微控制单元MCU750,并利用微控制单元MCU750计算获得被摄物对应的深度数据,然后将深度数据通过预设接口753提供至应用程序,以使应用程序调用深度数据进行安全验证,利用硬件的MCU750对数据进行保护,防止用户的信息被盗取,提升安全性。
在本申请的另一个实施例中,微控制单元MCU750还可用于:
通过镭射灯740发射激光,并通过泛光灯720向被摄物发射红外光。再通过激光摄像头710捕获经过被摄物的红外图像和激光图像。然后利用深度引擎752对红外图像和激光图像进行处理,以获取红外图像数据和深度数据。最后,将红外图像数据和深度数据通过预设接口753提供给应用程序,以使应用程序调用红外图像数据和深度数据进行安全验证。为了进一步提高验证的安全性,本实施例将红外图像和激光图像结合,将上述信息传输至硬件的MCU750中进行处理,再将处理后的红外图像数据和深度数据提供至可信运行环境下的应用程序进行身份验证。将红外图像和激光图像结合均放入MCU750进行保护,防止用户的信息被盗取,进一步提升安全性。例如,可先利用红外图像数据进行活体检测,检测到当前被摄物为活体时,再利用深度数据进行进一步地身份验证。
在本申请的又一个实施例中,微控制单元MCU750还可用于:
利用PWM751调制生成激光,通过镭射灯740发射激光。再由激光摄像头710捕获经过被摄物的激光图像。由可见光摄像头730拍摄被摄物的可见光图像。利用深度引擎752对可见光图像和激光图像进行处理,以获取可见光图像数据和深度数据。最后,将可见光图像数据和深度数据通过预设接口753提供给应用程序,以使应用程序调用可见光图像数据和深度数据进行安全验证。通过将可见光图像和激光图像结合,能够获取更丰富的被摄物的特征信息,如色彩、位置等,相对于激光图像,描述特征更加准确,提高身份验证的准确性。
当然,在某些应用场景中,由于某些应用程序的安全级别要求并不是特别高,并不需要可见光图像和激光图像均在MCU750中进行处理。为此,在保证一定安全性的情况下,在拍摄被摄物的可见光图像之后,可直接将可见光图像提供给可信运行环境下的应用程序进行处理,无需经过MCU750。而激光图像仍由MCU750进行处理,减轻MCU750的计算负担,提升处理速度。
如图9所示,本申请实施方式的终端设备800包括一个或多个处理器810、存储器820和一个或多个程序801。其中一个或多个程序801被存储在存储器820中,并且被配置成由一个或多个处理器810执行。程序801包括用于执行上述任意一项实施方式的基于激光的安全验证方法的指令。
例如,程序801包括用于执行以下步骤的基于激光的安全验证方法的指令:
S101’,向被摄物发射激光。
S102’,捕获经过被摄物的激光图像。
S103’,将激光图像发送至微控制单元MCU,并利用微控制单元MCU计算获得被摄物对应的深度数据。
S104’,将深度数据通过预设接口提供至应用程序,以使应用程序调用深度数据进行安全验证。
为实现上述实施例,本申请还提出一种非临时性计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现第一方面实施例的基于激光的安全验证方法。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本申请的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本申请的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本申请的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本申请的实施例所属技术领域的技术人员所理解。
在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、 解译或必要时以其他合适方式进行处理来以电子方式获得程序,然后将其存储在计算机存储器中。
应当理解,本申请的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。
此外,在本申请各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。
上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本申请的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本申请的限制,本领域的普通技术人员在本申请的范围内可以对上述实施例进行变化、修改、替换和变型。
Claims (24)
- 一种基于激光的安全验证方法,其特征在于,包括以下步骤:向被摄物发射激光;捕获经过所述被摄物的激光图像;将所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU计算获得所述被摄物对应的深度数据;以及将所述深度数据通过预设接口提供至应用程序,以使所述应用程序调用所述深度数据进行安全验证。
- 根据权利要求1所述的方法,其特征在于,还包括:向被摄物发射红外光和所述激光;捕获经过所述被摄物的红外图像和所述激光图像;将所述红外图像和所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU对所述红外图像和所述激光图像进行处理,以获取红外图像数据和所述深度数据;以及将所述红外图像数据和所述深度数据通过所述预设接口提供给所述应用程序,以使所述应用程序调用所述红外图像数据和所述深度数据进行安全验证。
- 根据权利要求1所述的方法,其特征在于,还包括:拍摄所述被摄物的可见光图像,并捕获经过所述被摄物的激光图像;将所述可见光图像和所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU对所述可见光图像和所述激光图像进行处理,以获取可见光图像数据和所述深度数据;以及将所述可见光图像数据和所述深度数据通过所述预设接口提供给所述应用程序,以使所述应用程序调用所述可见光图像数据和所述深度数据进行安全验证。
- 根据权利要求3所述的方法,其特征在于,还包括:在拍摄所述被摄物的可见光图像之后,直接将所述可见光图像提供给所述应用程序进行处理。
- 根据权利要求1所述的方法,其特征在于,利用所述微控制单元MCU计算获得所述被摄物对应的深度数据,包括:解调所述激光图像中变形位置像素对应的相位信息;将所述相位信息转化为高度信息;根据所述高度信息确定所述被摄物对应的深度数据。
- 根据权利要求1所述的方法,其特征在于,还包括:在计算获得所述被摄物对应的深度数据或获取所述被摄物对应的红外图像数据或拍摄可见光图像数据之后,对所述深度数据或所述红外图像数据或所述可见光图像数据进行加密;利用所述应用程序对加密后的深度数据或红外图像数据或所述可见光图像数据进行解密之后,调用所述深度数据或所述红外图像数据或所述可见光图像数据。
- 根据权利要求1至3任一项所述的方法,其特征在于,所述应用程序处于可信运行环境TEE下。
- 根据权利要求1至3任一项所述的方法,其特征在于,所述预设接口为符合预设标准的总线接口,包括MIPI总线接口、I2C同步串行总线接口、SPI总线接口。
- 一种基于激光的安全验证装置,其特征在于,包括:发射模块,用于向被摄物发射激光;捕获模块,用于捕获经过所述被摄物的激光图像;处理模块,用于将所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU计算获得所述被摄物对应的深度数据;以及提供模块,用于将所述深度数据通过预设接口提供至应用程序,以使所述应用程序调用所述深度数据进行安全验证。
- 根据权利要求9所述的装置,其特征在于,还包括:所述发射模块,还用于向被摄物发射红外光和所述激光;所述捕获模块,还用于捕获经过所述被摄物的红外图像和所述激光图像;所述处理模块,还用于将所述红外图像和所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU对所述红外图像和所述激光图像进行处理,以获取红外图像数据和所述深度数据;以及所述提供模块,还用于将所述红外图像数据和所述深度数据通过所述预设接口提供给所述应用程序,以使所述应用程序调用所述红外图像数据和所述深度数据进行安全验证。
- 根据权利要求9所述的装置,其特征在于,还包括:所述捕获模块,还用于拍摄所述被摄物的可见光图像,并捕获经过所述被摄物的激光图像;所述处理模块,还用于将所述可见光图像和所述激光图像发送至微控制单元MCU,并利用所述微控制单元MCU对所述可见光图像和所述激光图像进行处理,以获取可见光图像数据和所述深度数据;以及所述提供模块,还用于将所述可见光图像数据和所述深度数据通过所述预设接口提供给所述应用程序,以使所述应用程序调用所述可见光图像数据和所述深度数据进行安全验 证。
- 根据权利要求11所述的装置,其特征在于,还包括:所述提供模块,还用于在拍摄所述被摄物的可见光图像之后,直接将所述可见光图像提供给所述应用程序进行处理。
- 根据权利要求9所述的装置,其特征在于,所述处理模块,用于:解调所述激光图像中变形位置像素对应的相位信息;将所述相位信息转化为高度信息;根据所述高度信息确定所述被摄物对应的深度数据。
- 根据权利要求9所述的装置,其特征在于,所述装置还包括:加密模块,用于在计算获得所述被摄物对应的深度数据或获取所述被摄物对应的红外图像数据或拍摄可见光图像数据之后,对所述深度数据或所述红外图像数据或所述可见光图像数据进行加密;解密模块,用于利用所述应用程序对加密后的深度数据或红外图像数据或所述可见光图像数据进行解密之后,调用所述深度数据或所述红外图像数据或所述可见光图像数据。
- 根据权利要求9至11任一项所述的装置,其特征在于,所述应用程序处于可信运行环境TEE下。
- 根据权利要求9至11任一项所述的装置,其特征在于,所述预设接口为符合预设标准的总线接口,包括MIPI总线接口、I2C同步串行总线接口、SPI总线接口。
- 一种非临时性计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现权利要求1至8任一项所述的基于激光的安全验证方法。
- 一种终端设备,其特征在于,包括激光摄像头、泛光灯、可见光摄像头、镭射灯以及微控制单元MCU,所述微控制单元MCU包括脉冲宽度调制PWM、深度引擎、预设接口以及随机存取存储器RAM,其中,所述微控制单元MCU,用于:利用所述脉冲宽度调制PWM调制生成激光;通过所述镭射灯向被摄物发射所述激光;通过所述激光摄像头捕获经过所述被摄物的激光图像;将所述激光图像发送至所述深度引擎,并通过所述深度引擎计算获得所述被摄物对应的深度数据;以及将所述深度数据通过所述预设接口提供至应用程序,以使所述应用程序调用所述深度数据进行安全验证。
- 根据权利要求18所述的终端设备,其特征在于,所述微控制单元MCU,还用于:通过所述泛光灯向所述被摄物发射红外光,并通过所述镭射灯向被摄物发射所述激光;通过所述激光摄像头捕获经过所述被摄物的红外图像和所述激光图像;将所述红外图像和所述激光图像发送至所述深度引擎,并通过所述深度引擎计算获得所述被摄物对应的红外图像数据和所述深度数据;以及将所述红外图像数据和所述深度数据通过所述预设接口提供给所述应用程序,以使所述应用程序调用所述红外图像数据和所述深度数据进行安全验证。
- 根据权利要求18所述的终端设备,其特征在于,所述微控制单元MCU,还用于:获取所述可见光摄像头拍摄的所述被摄物的可见光图像,并通过所述激光摄像头捕获经过所述被摄物的所述激光图像;对所述可见光图像和所述激光图像进行处理,以获取可见光图像数据和所述深度数据;以及将所述可见光图像数据和所述深度数据通过所述预设接口提供给所述应用程序,以使所述应用程序调用所述可见光图像数据和所述深度数据进行安全验证。
- 根据权利要求18所述的终端设备,其特征在于,所述微控制单元MCU,具体用于:解调所述激光图像中变形位置像素对应的相位信息;将所述相位信息转化为高度信息;根据所述高度信息确定所述被摄物对应的深度数据。
- 根据权利要求18所述的终端设备,其特征在于,所述微控制单元MCU,还用于:在计算获得所述被摄物对应的深度数据或获取所述被摄物对应的红外图像数据或拍摄可见光图像数据之后,对所述深度数据或所述红外图像数据或所述可见光图像数据进行加密;利用所述应用程序对加密后的深度数据或红外图像数据或所述可见光图像数据进行解密之后,调用所述深度数据或所述红外图像数据或所述可见光图像数据。
- 根据权利要求18至20任一项所述的终端设备,其特征在于,所述应用程序处于可信运行环境TEE下。
- 根据权利要求18至20任一项所述的终端设备,其特征在于,所述预设接口为符合预设标准的总线接口,包括MIPI总线接口、I2C同步串行总线接口、SPI总线接口。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810327898.1A CN108564033A (zh) | 2018-04-12 | 2018-04-12 | 基于结构光的安全验证方法、装置及终端设备 |
CN201810327898.1 | 2018-04-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019196669A1 true WO2019196669A1 (zh) | 2019-10-17 |
Family
ID=63534808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/080163 WO2019196669A1 (zh) | 2018-04-12 | 2019-03-28 | 基于激光的安全验证方法、装置及终端设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108564033A (zh) |
WO (1) | WO2019196669A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108564033A (zh) * | 2018-04-12 | 2018-09-21 | Oppo广东移动通信有限公司 | 基于结构光的安全验证方法、装置及终端设备 |
CN110335303B (zh) * | 2019-06-24 | 2021-10-26 | Oppo广东移动通信有限公司 | 图像处理方法和装置、及存储介质 |
CN110855362B (zh) * | 2019-11-18 | 2021-08-03 | 南京工程学院 | 基于可见光led矩阵的保密通信方法和系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7440590B1 (en) * | 2002-05-21 | 2008-10-21 | University Of Kentucky Research Foundation | System and technique for retrieving depth information about a surface by projecting a composite image of modulated light patterns |
CN107169483A (zh) * | 2017-07-12 | 2017-09-15 | 深圳奥比中光科技有限公司 | 基于人脸识别的任务执行 |
CN107368730A (zh) * | 2017-07-31 | 2017-11-21 | 广东欧珀移动通信有限公司 | 解锁验证方法和装置 |
CN206672174U (zh) * | 2017-04-17 | 2017-11-24 | 深圳奥比中光科技有限公司 | 深度计算处理器以及3d图像设备 |
CN108564033A (zh) * | 2018-04-12 | 2018-09-21 | Oppo广东移动通信有限公司 | 基于结构光的安全验证方法、装置及终端设备 |
CN108595928A (zh) * | 2018-04-12 | 2018-09-28 | Oppo广东移动通信有限公司 | 人脸识别的信息处理方法、装置及终端设备 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102622588B (zh) * | 2012-03-08 | 2013-10-09 | 无锡中科奥森科技有限公司 | 双验证人脸防伪方法及装置 |
CN104390607B (zh) * | 2014-11-05 | 2017-04-19 | 南昌航空大学 | 基于相位编码的彩色结构光快速三维测量方法 |
CN107424187B (zh) * | 2017-04-17 | 2023-10-24 | 奥比中光科技集团股份有限公司 | 深度计算处理器、数据处理方法以及3d图像设备 |
CN107437019A (zh) * | 2017-07-31 | 2017-12-05 | 广东欧珀移动通信有限公司 | 唇语识别的身份验证方法和装置 |
CN107564050B (zh) * | 2017-08-09 | 2020-01-10 | Oppo广东移动通信有限公司 | 基于结构光的控制方法、装置和终端设备 |
CN107665334A (zh) * | 2017-09-11 | 2018-02-06 | 广东欧珀移动通信有限公司 | 基于表情的智能控制方法和装置 |
CN107748869B (zh) * | 2017-10-26 | 2021-01-22 | 奥比中光科技集团股份有限公司 | 3d人脸身份认证方法与装置 |
-
2018
- 2018-04-12 CN CN201810327898.1A patent/CN108564033A/zh active Pending
-
2019
- 2019-03-28 WO PCT/CN2019/080163 patent/WO2019196669A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7440590B1 (en) * | 2002-05-21 | 2008-10-21 | University Of Kentucky Research Foundation | System and technique for retrieving depth information about a surface by projecting a composite image of modulated light patterns |
CN206672174U (zh) * | 2017-04-17 | 2017-11-24 | 深圳奥比中光科技有限公司 | 深度计算处理器以及3d图像设备 |
CN107169483A (zh) * | 2017-07-12 | 2017-09-15 | 深圳奥比中光科技有限公司 | 基于人脸识别的任务执行 |
CN107368730A (zh) * | 2017-07-31 | 2017-11-21 | 广东欧珀移动通信有限公司 | 解锁验证方法和装置 |
CN108564033A (zh) * | 2018-04-12 | 2018-09-21 | Oppo广东移动通信有限公司 | 基于结构光的安全验证方法、装置及终端设备 |
CN108595928A (zh) * | 2018-04-12 | 2018-09-28 | Oppo广东移动通信有限公司 | 人脸识别的信息处理方法、装置及终端设备 |
Also Published As
Publication number | Publication date |
---|---|
CN108564033A (zh) | 2018-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI736883B (zh) | 影像處理方法和電子設備 | |
CN108805024B (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
CN108804895B (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
CN111126146B (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
US11275927B2 (en) | Method and device for processing image, computer readable storage medium and electronic device | |
CN107368730B (zh) | 解锁验证方法和装置 | |
WO2019196683A1 (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
CN107563304B (zh) | 终端设备解锁方法及装置、终端设备 | |
WO2019196684A1 (zh) | 数据传输方法、装置、计算机可读存储介质、电子设备和移动终端 | |
WO2019196669A1 (zh) | 基于激光的安全验证方法、装置及终端设备 | |
CN108711054B (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
CN110036391B (zh) | 用于视觉识别认证的光学反馈 | |
CN112802116B (zh) | 图像处理方法、摄像头标定方法、装置、存储介质和电子设备 | |
TWI675308B (zh) | 驗證生物特徵圖像的可用性的方法和裝置 | |
CN109213610B (zh) | 数据处理方法、装置、计算机可读存储介质和电子设备 | |
WO2019218943A1 (zh) | 基于前置双摄像头的安全验证方法及电子设备 | |
CN108830141A (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
CN108985255B (zh) | 数据处理方法、装置、计算机可读存储介质和电子设备 | |
CN108712400B (zh) | 数据传输方法、装置、计算机可读存储介质和电子设备 | |
US11170204B2 (en) | Data processing method, electronic device and computer-readable storage medium | |
WO2020015403A1 (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
CN108924421B (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
CN108833885B (zh) | 图像处理方法、装置、计算机可读存储介质和电子设备 | |
WO2020024619A1 (zh) | 数据处理方法、装置、计算机可读存储介质和电子设备 | |
US11308636B2 (en) | Method, apparatus, and computer-readable storage medium for obtaining a target image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19785278 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19785278 Country of ref document: EP Kind code of ref document: A1 |