WO2020087527A1 - Fingerprint verification method and apparatus, device and storage medium - Google Patents

Fingerprint verification method and apparatus, device and storage medium Download PDF

Info

Publication number
WO2020087527A1
WO2020087527A1 PCT/CN2018/113803 CN2018113803W WO2020087527A1 WO 2020087527 A1 WO2020087527 A1 WO 2020087527A1 CN 2018113803 W CN2018113803 W CN 2018113803W WO 2020087527 A1 WO2020087527 A1 WO 2020087527A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
fingerprint information
fingerprint
authentication
user operation
Prior art date
Application number
PCT/CN2018/113803
Other languages
French (fr)
Chinese (zh)
Inventor
曹岚健
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to PCT/CN2018/113803 priority Critical patent/WO2020087527A1/en
Priority to CN201880002045.9A priority patent/CN109564604A/en
Publication of WO2020087527A1 publication Critical patent/WO2020087527A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Definitions

  • This application relates to the technical field of fingerprint authentication, and in particular to a fingerprint authentication method, device, equipment and storage medium.
  • the use of terminals such as mobile phones, tablet computers, etc.
  • fingerprint recognition technology is widely used in the functions of unlocking, awakening and mobile payment of the terminal.
  • the fingerprint payment function can not only overcome the disadvantage that the digital password is easily stolen in the prior art, but also input faster.
  • identity authentication through fingerprint recognition usually involves touching or tapping on the fingerprint collection module with a finger to trigger the fingerprint authentication module to perform fingerprint authentication. If the fingerprint authentication module is successfully authenticated, the business behavior after the successful authentication is triggered.
  • this application provides a fingerprint authentication method, device, equipment and storage medium.
  • this application provides a fingerprint authentication method, including:
  • the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's will due to misoperation Improve the security and reliability of the terminal.
  • the first user operation is a user's pressing operation on the target key.
  • the first user operation is the user's pressing operation on the target button
  • the first user operation is simple and convenient, and through the first user operation, after the fingerprint authentication is successful, the user performs the pressing operation on the target button , It does not trigger the business behavior after the fingerprint information authentication is successful, which improves the operability of the terminal.
  • the business behavior after the fingerprint information authentication is successful is triggered.
  • the second user operation on the target button is acquired, and then the business behavior after the fingerprint information authentication is successful is triggered, and the second user operation is used to further determine that the fingerprint information authentication is successful.
  • Business behavior improve the reliability of the terminal.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the second user operation is the operation of removing the finger from the target button
  • the second user operation is simple and convenient, and through the second user operation, after the fingerprint authentication is successful, the user moves away from the target button Finger operation, and then trigger the business behavior after successful fingerprint information authentication, improve the operability and reliability of the terminal.
  • the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is authenticated, including:
  • the fingerprint authentication method provided in this embodiment of the present application further includes:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • this application provides a fingerprint authentication device, including:
  • the obtaining module is used to obtain the user's fingerprint information through the target button, and the authentication module is used to authenticate the obtained fingerprint information; the first processing module is used to authenticate the fingerprint information and obtain the first target button User operation does not trigger business behavior after fingerprint information authentication is successful.
  • the first user operation is a user's pressing operation on the target key.
  • the fingerprint authentication device provided in this application further includes:
  • the second processing module is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and a second user operation on the target key is acquired.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the authentication module is specifically used for:
  • the fingerprint authentication device provided by the embodiment of the present invention further includes:
  • the pushing module is used to push the prompt information if the fingerprint information authentication is successful and the first user operation on the target button is obtained to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the present application provides a fingerprint identification module, including: a target button and a micro control unit MCU;
  • the MCU is used to obtain the user fingerprint information through the target button, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor to When the processor determines that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
  • the first user operation is a user's pressing operation on the target key.
  • the MCU is also used for:
  • the second user operation is obtained through the target button, the second user operation is sent to the processor, so that when the processor determines that the fingerprint information authentication is successful according to the authentication result, the business after the fingerprint information authentication succeeds is triggered according to the second user operation behavior.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the MCU is specifically used for:
  • the MCU is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the present application provides a terminal device.
  • the terminal device includes: a fingerprint identification module and a processor, and the fingerprint identification module includes: a target button and a micro control unit MCU;
  • the MCU is used to: obtain the user fingerprint information through the target button, and authenticate the obtained fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor .
  • the processor is used for: if it is determined that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
  • the first user operation is a user's pressing operation on the target key.
  • the MCU is also used to send the second user operation to the processor if the second user operation is acquired through the target button.
  • the processor is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the MCU is specifically used for:
  • the MCU is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the present application provides a computer storage medium, the storage medium including computer instructions, which when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
  • the present application provides a computer program product, including computer instructions, which, when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
  • This application provides a fingerprint authentication method, device, equipment, and storage medium, including: obtaining user fingerprint information through a target button, and authenticating the obtained fingerprint information; if the fingerprint information is successfully authenticated, and the target button is obtained.
  • the first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
  • the fingerprint information authentication is successful, the first user operation is acquired, and the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's wishes due to misoperation, and further Improve the security and reliability of the terminal.
  • FIG. 1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of this application.
  • FIG. 2 is a schematic diagram of an operation interface provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application.
  • FIG. 4 is a schematic diagram of an operation interface provided by another embodiment of the present application.
  • FIG. 5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
  • the embodiments of the present application provide a fingerprint authentication method, device, device and storage medium.
  • the terminal displays a malicious virus webpage.
  • the front-end program of the webpage is a payment page. At this time, it is waiting to verify the user's fingerprint.
  • the payment page is disguised as other display forms, and the user cannot perceive that this page is a payment page, and the page does not provide an exit button.
  • the habitual behavior of the user is to press the home button to exit the page, but when the user clicks the home button with the registered fingerprint finger, the fingerprint information authentication succeeds, which in turn triggers the payment behavior after the fingerprint authentication succeeds, causing unnecessary property loss .
  • the terminal displays a malicious virus webpage.
  • the front-end program of the webpage is a payment page, and there is no exit button. It is waiting to verify the user's fingerprint.
  • the page is not disguised as other forms.
  • the user quits the page by pressing the Home button in anxiety, but when the user clicks the Home button with a registered fingerprint finger, the fingerprint information verification is successful, which in turn triggers the payment behavior after successful fingerprint authentication, resulting in User unnecessary property loss.
  • this application provides a fingerprint authentication method, device, equipment, and storage medium.
  • FIG. 1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of the present application. As shown in FIG. 1, this embodiment is illustrated by applying the method to a terminal.
  • the terminal may be a mobile phone, a digital broadcasting terminal, and a message receiving and sending device.
  • Game consoles, tablet devices, medical devices, fitness equipment, personal digital assistants, etc. the method includes the following steps:
  • Step S11 Obtain the user fingerprint information through the target button, and authenticate the acquired fingerprint information.
  • Step S12 If the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is not triggered.
  • the target button may be a physical button such as a Home button, a return button, and a confirmation button.
  • the target button may also be a virtual button, such as a floating ball, etc.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the user's fingerprint information is obtained through the user's related operation on the target button, where the user's related operation on the target button may be the user's touch operation on the target button, and the user feeds back the user's fingerprint information to the micro control unit in the terminal device through the related operation ,
  • the terminal recognizes and authenticates the user's fingerprint information.
  • Fingerprint recognition refers to the identification by comparing the detailed feature points of different fingerprints. Fingerprint recognition technology involves image processing, pattern recognition, computer vision, mathematical morphology, wavelet analysis and many other disciplines. Since each person's fingerprint is different, and there are obvious differences between the same person's ten fingers, the fingerprint can be used for identification. The embodiment of the present application does not limit the specific method of fingerprint identification, as long as it can identify the user's fingerprint information.
  • obtaining the user fingerprint information through the target button and authenticating the obtained fingerprint information includes: obtaining a legal user fingerprint template; matching the user fingerprint information with the fingerprint template.
  • the user Before performing fingerprint authentication, the user also needs to obtain a legal user fingerprint template.
  • the legal user fingerprint template can be obtained by touching the user's fingerprint in the terminal to the target button that can collect the user fingerprint template. For example, the user can obtain , Use the right index finger to touch the target button multiple times, and register the preset fingerprint information of the user by repeatedly inputting the user fingerprint information, so as to obtain a legal user fingerprint template.
  • the embodiment of the present application does not limit the specific method of acquiring the user fingerprint template. In addition, the embodiment of the present application also does not limit the fingers of the acquired user fingerprint template and the number of acquired user fingerprint templates, as long as the legal user fingerprint can be obtained Template.
  • the obtained fingerprint information After obtaining the user's fingerprint information through the user's related operation on the target button, the obtained fingerprint information also needs to be authenticated. Specifically, the user's fingerprint information and the user's fingerprint template can be matched, because there are bumps on the front skin of the finger end The uneven texture contains a lot of information. The patterns of these skins are different in patterns, breakpoints, and intersections, and they are called "features" in information processing, and these features are unique and permanent, and can correspond one person to their fingerprints one by one. .
  • By matching the user fingerprint information with the user fingerprint template and judging the authentication result based on the similarity between the user fingerprint information and the user fingerprint template if the user fingerprint information matches the user fingerprint template successfully, the user fingerprint information is successfully authenticated. If the fingerprint information and the user fingerprint template match fail, the user fingerprint information authentication fails.
  • the embodiment of the present application does not make any limitation on the fingerprint information authentication method, as long as it can authenticate the acquired user fingerprint information.
  • Authentication of user fingerprint information can be achieved through the central processing unit (CPU) of the terminal device, or through the microcontroller unit (MCU) of the terminal device.
  • CPU central processing unit
  • MCU microcontroller unit
  • the authentication result of the user fingerprint information may be that the authentication of the user fingerprint information is successful or the authentication of the user fingerprint information fails. If the authentication of the user fingerprint information fails, the fingerprint will not be triggered For the business behavior after the authentication is successful, if you need to continue to execute the business behavior after the fingerprint authentication is successful, you need to re-acquire the user fingerprint information and authenticate the acquired fingerprint information.
  • the embodiments of this application do not do anything about the terminal behavior after the authentication fails limit.
  • the fingerprint information authentication is successful, the first user operation on the target button needs to be obtained. In the case where the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the successful fingerprint information authentication is not triggered. By further restricting the conditions that trigger the business behavior after the fingerprint information authentication is successful, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal.
  • the front-end program of the webpage is a payment page
  • the payment page is in the form of a normal payment page or disguised as other display forms, waiting for user fingerprint information authentication, if the user uses If the finger touches or clicks the home button, the fingerprint information authentication succeeds, and the user can also operate through the first user without triggering the payment behavior after the fingerprint information authentication succeeds, thereby avoiding unnecessary property loss of the user.
  • acquiring the first user operation on the target key can be implemented by the MCU in the terminal device.
  • FIG. 2 is a schematic diagram of an operation interface provided by an embodiment of the present application. As shown in FIG. 2, during the payment process, the user ’s fingerprint information needs to be obtained. , The interface 201 indicates that the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated.
  • the user can perform the first user operation on the target button, where the interface 202 indicates the acquisition To the first user operation on the target button, the terminal pushes a prompt message 212 to remind the user that the current payment behavior has been blocked.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the first user operation may be a touch operation on the target key exceeding a preset duration, or a long press operation on the target key, etc.
  • the embodiment of the present application does not specifically limit the operation of the first user, as long as the fingerprint authentication is successful and The first user operation can be acquired without triggering the business behavior after the fingerprint information authentication routine.
  • the first user operation is a pressing operation on the target key. After the fingerprint information authentication is successful, the user performs a pressing operation on the target key, and the business behavior after the fingerprint information authentication is successful is not triggered.
  • a malicious virus webpage the front-end program of the webpage is a payment page
  • the payment page is in the form of a normal payment page or disguised as other display forms, waiting for the user's fingerprint information to be authenticated, although the user uses the registered fingerprint finger Touching the home button results in successful fingerprint information authentication, but the user can also press the home button to prevent the terminal from triggering payment after the fingerprint information authentication is successful, thereby avoiding unnecessary property loss for the user.
  • the first user operation may also be that the registered fingerprint finger touches the target key for more than a preset duration. For example, after the authentication of the obtained user fingerprint information is successful, the registered fingerprint finger touches the target button for more than a preset duration, and the business behavior after the successful fingerprint authentication is not triggered.
  • the embodiment of the present application can obtain the first user operation after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is not triggered, and whether the fingerprint information is successfully authenticated is achieved. Trigger the corresponding business behavior for manual control, which effectively avoids business behavior that violates the user's wishes due to misoperation, etc., thereby improving the security and reliability of the terminal.
  • FIG. 3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application.
  • the method is applied to a terminal for illustration.
  • the terminal may be a mobile phone or a digital broadcasting terminal.
  • the fingerprint authentication method provided in this application also includes:
  • Step S21 If the fingerprint information authentication is successful, and a second user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • a second user operation on the target key needs to be acquired.
  • trigger The business behavior after the fingerprint information authentication succeeds, by further restricting the conditions that trigger the business behavior after the fingerprint information authentication succeeds, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal .
  • Alipay's payment is successful and does not affect the triggering of the normal case Business behavior after successful fingerprint information authentication.
  • FIG. 4 is a schematic diagram of an operation interface provided by another embodiment of the present application.
  • the user for example, in the case where normal Alipay payment requires fingerprint authentication, the user ’s fingerprint information needs to be obtained and the fingerprint information is authenticated.
  • Interface 401 shows The user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated.
  • the user performs a second user operation on the terminal.
  • the user interface 402 indicates that after the fingerprint information is successfully authenticated, the target The second user operation of the button triggers the payment behavior after the fingerprint information authentication is successful.
  • the user may also be prompted to push the payment successfully through the push message 412.
  • the second user operation may be a touch operation on the target key, or may be a pressing operation on the target key, etc.
  • the embodiment of the present application does not specifically limit the operation of the second user, as long as the fingerprint authentication is successful and the second The user operation can trigger the business behavior after the fingerprint information authentication routine.
  • the second user operation is an operation in which the user removes the finger from the target key. For example, in the case where normal Alipay payment requires fingerprint authentication, by acquiring the user's fingerprint information and authenticating the fingerprint information, and the user removes the finger from the target button, the Alipay payment is successful, which does not affect the fingerprint information authentication under normal circumstances Business behavior after success. Acquiring the second user operation on the target key can be implemented by the MCU in the terminal device.
  • the embodiments of the present application do not specifically limit the operation of the first user and the operation of the second user, as long as the terminal can perform corresponding non-trigger or trigger business operations after successful fingerprint authentication according to the first user operation or the second user operation.
  • the embodiment of the present application since the embodiment of the present application can obtain the operation of the second user after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is triggered, which effectively avoids the violation of the user due to misoperation and the like Willing business behavior, thereby improving the security and reliability of the terminal.
  • FIG. 5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application.
  • the method is applied to a terminal for illustration.
  • the terminal may be a mobile phone or a digital broadcast.
  • the fingerprint authentication device provided by the embodiment of the present application includes:
  • the obtaining module 51 is used to obtain user fingerprint information through the target button, and the authentication module 52 is used to authenticate the obtained fingerprint information; the first processing module 53 is used to authenticate the fingerprint information and obtain the target button The first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
  • the first user operation is a user's pressing operation on the target key.
  • the fingerprint authentication device provided in this application further includes:
  • the second processing module 54 is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and the second user operation is acquired.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the authentication module is specifically used for:
  • the pushing module 55 is configured to, if the fingerprint information authentication is successful and the first user operation on the target button is obtained, push the prompt information to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the fingerprint authentication device provided by the embodiment of the present application may be used to execute the above-mentioned fingerprint authentication method.
  • the content and effect refer to the method section.
  • the embodiment of the present application does not limit this.
  • FIG. 6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the application. As shown in FIG. 6, the fingerprint identification module provided by the application includes: a target button 61 and a micro control Unit MCU62.
  • the MCU 62 is used to obtain the user fingerprint information through the target button 61, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button 61, the first user operation is sent to the processor , So that the processor does not trigger the business behavior after the fingerprint information authentication succeeds according to the first user operation when the processor determines that the fingerprint information authentication is successful according to the authentication result.
  • the first user operation is a user's pressing operation on the target button 61.
  • MCU62 is also used for:
  • the second user operation is acquired through the target button 61, the second user operation is sent to the processor, so that when the processor determines that fingerprint information authentication is successful according to the authentication result, the fingerprint information authentication is triggered according to the second user operation Business behavior.
  • the number of MCU62 can be one or more than two, for example, the number of MCU62 is one, then the MCU62 is used to obtain user fingerprint information and authenticate fingerprint information, and send the authentication result to the processor, and also use It is used to acquire the first user operation and send the first user operation to the processor, and also used to acquire the second user operation and send the second user operation to the processor.
  • the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor
  • the second MCU62 can be used to obtain user fingerprint information and Authenticate fingerprint information, send the authentication result to the processor, also used to obtain the first user operation, send the first user operation to the processor, also used to obtain the second user operation, and operate the second user Sent to the processor.
  • the work that each MCU 62 is responsible for does not limit, as long as the technical solution of the present application can be realized.
  • the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor, and the second MCU62 is used to obtain user fingerprint information and The fingerprint information is authenticated, and the authentication result is sent to the processor.
  • the third MCU 62 is used to obtain the second user operation, and the second user operation is sent to the processor.
  • the second user operation is an operation in which the user removes the finger from the target button 61.
  • MCU62 is specifically used for:
  • MCU62 is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target button 61 is any one of the Home button, the Back button, or the Confirm button.
  • the fingerprint identification module provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method, and the content and effect may refer to the method section, which is not limited by the embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of the terminal device according to an embodiment of the present application.
  • the terminal device includes: a fingerprint identification module 71 and a processor 72, fingerprint identification Module 71 includes: target button 711 and micro control unit 712MCU712 for:
  • the processor 72 is configured to: if the fingerprint information is successfully authenticated according to the authentication result, according to the first user operation, the business behavior after the successful fingerprint information authentication is not triggered.
  • the first user operation is a user's pressing operation on the target button 711.
  • MCU712 is also used for:
  • the second user operation is acquired through the target button 711, the second user operation is sent to the processor 72;
  • the processor 72 is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
  • the second user operation is an operation in which the user removes the finger from the target button 711.
  • MCU712 is specifically used for:
  • MCU712 is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target button 711 is any one of the Home button, the Back button, or the Confirm button.
  • the terminal device provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method.
  • the method section which is not limited by the embodiment of the present application.
  • An embodiment of the present application further provides a computer storage medium.
  • the storage medium includes computer instructions. When the instructions are executed by the computer, the computer is enabled to implement the fingerprint authentication method as described above.
  • An embodiment of the present application further provides a computer program product, including: computer instructions, which when executed by the computer, cause the computer to implement the fingerprint authentication method as described above.

Abstract

The present application provides a fingerprint verification method and apparatus, a device and a storage medium. The method comprises: obtaining fingerprint information of a user by means of a target button, and verifying the obtained fingerprint information; and if the verification of the fingerprint information is successful and a first user operation for the target button is obtained, not triggering the service behavior after the successful verification of the fingerprint information. The security and reliability of a terminal are improved.

Description

指纹认证方法、装置、设备及存储介质Fingerprint authentication method, device, equipment and storage medium 技术领域Technical field
本申请涉及指纹认证技术领域,尤其涉及一种指纹认证方法、装置、设备及存储介质。This application relates to the technical field of fingerprint authentication, and in particular to a fingerprint authentication method, device, equipment and storage medium.
背景技术Background technique
随着信息技术的快速发展,终端(如手机、平板电脑等等)的使用越来越普及。作为终端上的标配技术,指纹识别技术在终端的解锁、唤醒、移动支付等功能中得到广泛应用。尤其是指纹支付功能,不仅可克服了现有技术中数字密码容易被窃取的弊端,而且输入更为快捷。With the rapid development of information technology, the use of terminals (such as mobile phones, tablet computers, etc.) is becoming more and more popular. As the standard technology on the terminal, fingerprint recognition technology is widely used in the functions of unlocking, awakening and mobile payment of the terminal. In particular, the fingerprint payment function can not only overcome the disadvantage that the digital password is easily stolen in the prior art, but also input faster.
现有技术中,通过指纹识别进行身份认证,通常是通过手指触摸或点按在指纹采集模块,触发指纹认证模块进行指纹认证,若指纹认证模块认证成功,则触发认证成功后的业务行为。In the prior art, identity authentication through fingerprint recognition usually involves touching or tapping on the fingerprint collection module with a finger to trigger the fingerprint authentication module to perform fingerprint authentication. If the fingerprint authentication module is successfully authenticated, the business behavior after the successful authentication is triggered.
然而,现有技术中,由于指纹识别过程中,指纹认证成功即触发认证成功后的业务行为,针对用户无法判断其安全性的某恶意病毒网页,容易因个人的无意或被强行引导或误导进行指纹验证,造成不必要的人身安全信息泄露或财产损失,终端的安全性较低。However, in the prior art, due to the fingerprint recognition process, successful fingerprint authentication triggers the business behavior after the authentication is successful. For a malicious virus web page where the user cannot judge its security, it is easy to be guided or misled by individuals for unintentional or forced Fingerprint verification causes unnecessary leakage of personal safety information or loss of property, and the security of the terminal is low.
发明内容Summary of the invention
为克服现有技术中存在的相关问题,本申请提供一种指纹认证方法、装置、设备及存储介质。In order to overcome the related problems in the prior art, this application provides a fingerprint authentication method, device, equipment and storage medium.
第一方面,本申请提供一种指纹认证方法,包括:In the first aspect, this application provides a fingerprint authentication method, including:
通过目标按键获取用户指纹信息,并对获取到的指纹信息进行认证;若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则不触发指纹信息认证成功之后的业务行为。Obtain user fingerprint information through the target button and authenticate the acquired fingerprint information; if the fingerprint information is successfully authenticated and the first user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is not triggered.
由于本申请实施例中,通过在指纹信息认证成功之后,获取到第一用户操作,则不触发指纹信息认证成功之后的业务行为,有效的避免了由于误操作造成违背用户意愿的业务行为,进而提高了终端的安全性和可靠性。In this embodiment of the present application, by acquiring the first user operation after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's will due to misoperation Improve the security and reliability of the terminal.
可选的,第一用户操作为用户对目标按键的按下操作。Optionally, the first user operation is a user's pressing operation on the target key.
由于本申请实施例中,第一用户操作为用户对目标按键的按下操作,第一用户操作简单、便捷,且通过第一用户操作,在指纹认证成功后,用户对目标按键执行按下操作,即可不触发指纹信息认证成功之后的业务行为,提高了终端的可操作性。Because in the embodiment of the present application, the first user operation is the user's pressing operation on the target button, the first user operation is simple and convenient, and through the first user operation, after the fingerprint authentication is successful, the user performs the pressing operation on the target button , It does not trigger the business behavior after the fingerprint information authentication is successful, which improves the operability of the terminal.
可选的,若对指纹信息认证成功,且获取到对目标按键的第二用户操作,则触发指纹信息认证成功之后的业务行为。Optionally, if the fingerprint information authentication is successful, and a second user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is triggered.
由于本申请实施例中,在对指纹信息认证成功之后,获取到对目标按键的第二用户操作,则触发指纹信息认证成功之后的业务行为,通过第二用户操作进一步确定触发指纹信息认证成功之后的业务行为,提高了终端的可靠性。In the embodiment of the present application, after the fingerprint information authentication is successful, the second user operation on the target button is acquired, and then the business behavior after the fingerprint information authentication is successful is triggered, and the second user operation is used to further determine that the fingerprint information authentication is successful. Business behavior, improve the reliability of the terminal.
可选的,第二用户操作为用户从目标按键移开手指的操作。Optionally, the second user operation is an operation in which the user removes the finger from the target key.
由于本申请实施例中,第二用户操作为用户从目标按键移开手指的操作,第二用户操作简单、便捷,且通过第二用户操作,在指纹认证成功后,通过用户从目标按键移开手指操作,然后触发指纹信息认证成功之后的业务行为,提高了终端的可操作性和可靠性。Because in the embodiment of the present application, the second user operation is the operation of removing the finger from the target button, the second user operation is simple and convenient, and through the second user operation, after the fingerprint authentication is successful, the user moves away from the target button Finger operation, and then trigger the business behavior after successful fingerprint information authentication, improve the operability and reliability of the terminal.
可选的,通过目标按键获取用户指纹信息,并对获取到的指纹信息进行认证,包括:Optionally, the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is authenticated, including:
获取合法的用户指纹模板;对用户指纹信息和用户指纹模板进行匹配。Obtain legal user fingerprint templates; match user fingerprint information with user fingerprint templates.
可选的,本申请实施例提供的指纹认证方法还包括:Optionally, the fingerprint authentication method provided in this embodiment of the present application further includes:
若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button is obtained, the prompt information is pushed to remind the user that the business operation cannot be performed.
可选的,业务行为是用户支付行为。Optionally, the business behavior is user payment behavior.
可选的,目标按键为Home键、返回键或者确认键中的任一项。Optionally, the target key is any of the Home key, Back key, or Confirm key.
下面将介绍装置、设备、存储介质及计算机程序产品,其效果可参考方法部分的效果,下面对此不再赘述。The following will introduce the device, equipment, storage medium, and computer program product, and the effect can refer to the effect of the method part, which will not be repeated below.
第二方面,本申请提供一种指纹认证装置,包括:In a second aspect, this application provides a fingerprint authentication device, including:
获取模块,用于通过目标按键获取用户指纹信息,认证模块,用于对获取到的指纹信息进行认证;第一处理模块,用于若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则不触发指纹信息认证成功之后的业务 行为。The obtaining module is used to obtain the user's fingerprint information through the target button, and the authentication module is used to authenticate the obtained fingerprint information; the first processing module is used to authenticate the fingerprint information and obtain the first target button User operation does not trigger business behavior after fingerprint information authentication is successful.
可选的,第一用户操作为用户对目标按键的按下操作。Optionally, the first user operation is a user's pressing operation on the target key.
可选的,本申请提供的指纹认证装置还包括:Optionally, the fingerprint authentication device provided in this application further includes:
第二处理模块,用于若对指纹信息认证成功,且获取到对目标按键的第二用户操作,则触发指纹信息认证成功之后的业务行为。The second processing module is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and a second user operation on the target key is acquired.
可选的,第二用户操作为用户从目标按键移开手指的操作。Optionally, the second user operation is an operation in which the user removes the finger from the target key.
可选的,认证模块具体用于:Optionally, the authentication module is specifically used for:
获取合法的用户指纹模板;对用户指纹信息和用户指纹模板进行匹配。Obtain legal user fingerprint templates; match user fingerprint information with user fingerprint templates.
可选的,本发明实施例提供的指纹认证装置,还包括:Optionally, the fingerprint authentication device provided by the embodiment of the present invention further includes:
推送模块,用于若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。The pushing module is used to push the prompt information if the fingerprint information authentication is successful and the first user operation on the target button is obtained to remind the user that the business operation cannot be performed.
可选的,业务行为是用户支付行为。Optionally, the business behavior is user payment behavior.
可选的,目标按键为Home键、返回键或者确认键中的任一项。Optionally, the target key is any of the Home key, Back key, or Confirm key.
第三方面,本申请提供一种指纹识别模组,包括:目标按键和微控制单元MCU;In a third aspect, the present application provides a fingerprint identification module, including: a target button and a micro control unit MCU;
MCU用于:通过目标按键获取用户指纹信息,对指纹信息进行认证,并将认证结果发送给处理器;若通过目标按键获取到第一用户操作,则将第一用户操作发送给处理器,以使处理器根据认证结果确定对指纹信息认证成功时,根据第一用户操作不触发指纹信息认证成功之后的业务行为。The MCU is used to obtain the user fingerprint information through the target button, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor to When the processor determines that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
可选的,第一用户操作为用户对目标按键的按下操作。Optionally, the first user operation is a user's pressing operation on the target key.
可选的,MCU还用于:Optionally, the MCU is also used for:
若通过目标按键获取到第二用户操作,则将第二用户操作发送给处理器,以使处理器根据认证结果确定对指纹信息认证成功时,根据第二用户操作触发指纹信息认证成功之后的业务行为。If the second user operation is obtained through the target button, the second user operation is sent to the processor, so that when the processor determines that the fingerprint information authentication is successful according to the authentication result, the business after the fingerprint information authentication succeeds is triggered according to the second user operation behavior.
可选的,第二用户操作为用户从目标按键移开手指的操作。Optionally, the second user operation is an operation in which the user removes the finger from the target key.
可选的,MCU具体用于:Optionally, the MCU is specifically used for:
获取合法的用户指纹模板;对用户指纹信息和用户指纹模板进行匹配。Obtain legal user fingerprint templates; match user fingerprint information with user fingerprint templates.
可选的,MCU还用于:Optionally, the MCU is also used for:
若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button is obtained, the prompt information is pushed to remind the user that the business operation cannot be performed.
可选的,业务行为是用户支付行为。Optionally, the business behavior is user payment behavior.
可选的,目标按键为Home键、返回键或者确认键中的任一项。Optionally, the target key is any of the Home key, Back key, or Confirm key.
第四方面,本申请提供一种终端设备,终端设备包括:指纹识别模组和处理器,所述指纹识别模组包括:目标按键和微控制单元MCU;In a fourth aspect, the present application provides a terminal device. The terminal device includes: a fingerprint identification module and a processor, and the fingerprint identification module includes: a target button and a micro control unit MCU;
MCU用于:通过目标按键获取用户指纹信息,并对获取到的指纹信息进行认证,向处理器发送认证结果;若通过目标按键获取到第一用户操作,则将第一用户操作发送给处理器。The MCU is used to: obtain the user fingerprint information through the target button, and authenticate the obtained fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor .
处理器用于:若根据认证结果确定对指纹信息认证成功,则根据第一用户操作不触发指纹信息认证成功之后的业务行为。The processor is used for: if it is determined that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
可选的,第一用户操作为用户对目标按键的按下操作。Optionally, the first user operation is a user's pressing operation on the target key.
可选的,MCU,还用于若通过目标按键获取到第二用户操作,则将第二用户操作发送给处理器。Optionally, the MCU is also used to send the second user operation to the processor if the second user operation is acquired through the target button.
处理器,还用于若根据认证结果确定对指纹信息认证成功时,根据第二用户操作触发指纹信息认证成功之后的业务行为。The processor is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
可选的,第二用户操作为用户从目标按键移开手指的操作。Optionally, the second user operation is an operation in which the user removes the finger from the target key.
可选的,MCU具体用于:Optionally, the MCU is specifically used for:
获取合法的用户指纹模板;对用户指纹信息和用户指纹模板进行匹配。Obtain legal user fingerprint templates; match user fingerprint information with user fingerprint templates.
可选的,MCU还用于:Optionally, the MCU is also used for:
若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button is obtained, the prompt information is pushed to remind the user that the business operation cannot be performed.
可选的,业务行为是用户支付行为。Optionally, the business behavior is user payment behavior.
可选的,目标按键为Home键、返回键或者确认键中的任一项。Optionally, the target key is any of the Home key, Back key, or Confirm key.
第五方面,本申请提供一种计算机存储介质,存储介质包括计算机指令,当指令被计算机执行时,使得计算机实现第一方面或第一方面可选方式的指纹认证方法。According to a fifth aspect, the present application provides a computer storage medium, the storage medium including computer instructions, which when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
第六方面,本申请提供一种计算机程序产品,包括计算机指令,当指令被计算机执行时,使得计算机实现第一方面或第一方面可选方式的指纹认证方法。In a sixth aspect, the present application provides a computer program product, including computer instructions, which, when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
本申请提供一种指纹认证方法、装置、设备及存储介质,包括:通过目标按键获取用户指纹信息,并对获取到的指纹信息进行认证;若对指纹信息 认证成功,且获取到对目标按键的第一用户操作,则不触发指纹信息认证成功之后的业务行为。由于本申请实施例中,在指纹信息认证成功之后,通过获取到第一用户操作,则不触发指纹信息认证成功之后的业务行为,有效的避免了由于误操作造成违背用户意愿的业务行为,进而提高了终端的安全性和可靠性。This application provides a fingerprint authentication method, device, equipment, and storage medium, including: obtaining user fingerprint information through a target button, and authenticating the obtained fingerprint information; if the fingerprint information is successfully authenticated, and the target button is obtained The first user operation does not trigger the business behavior after the fingerprint information authentication is successful. In this embodiment of the present application, after the fingerprint information authentication is successful, the first user operation is acquired, and the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's wishes due to misoperation, and further Improve the security and reliability of the terminal.
附图说明BRIEF DESCRIPTION
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly explain the embodiments of the present application or the technical solutions in the prior art, the following will briefly introduce the drawings required in the embodiments or the description of the prior art. Obviously, the drawings in the following description These are some embodiments of the present application. For those of ordinary skill in the art, without paying creative labor, other drawings may be obtained based on these drawings.
图1是本申请一实施例提供的指纹认证方法的流程示意图;1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of this application;
图2是本申请一实施例提供的操作界面示意图;2 is a schematic diagram of an operation interface provided by an embodiment of the present application;
图3是本申请另一实施例提供的指纹认证方法的流程示意图;3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application;
图4是本申请另一实施例提供的操作界面示意图;4 is a schematic diagram of an operation interface provided by another embodiment of the present application;
图5是本申请一实施例提供的指纹认证装置的示意图;5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application;
图6是本申请一实施例提供的指纹识别模组的结构示意图;6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the present application;
图7是本申请一实施例提供的终端设备的结构示意图。7 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
具体实施方式detailed description
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。To make the objectives, technical solutions, and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, but not all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by a person of ordinary skill in the art without creative work fall within the protection scope of the present application.
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例,例如能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖 不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of this application and the above drawings are used to distinguish similar objects without using To describe a specific order or sequence. It should be understood that the data used in this way can be interchanged under appropriate circumstances, so that the embodiments of the present application described herein, for example, can be implemented in an order other than those illustrated or described herein. In addition, the terms "including" and "having" and any variations thereof are intended to cover non-exclusive inclusions, for example, processes, methods, systems, products or devices that contain a series of steps or units need not be limited to those clearly listed Those steps or units, but may include other steps or units not explicitly listed or inherent to these processes, methods, products, or equipment.
随着信息技术的快速发展,终端(如手机、平板电脑等等)的使用越来越普及。作为终端上的标配技术,指纹识别技术在终端的解锁、唤醒、移动支付等功能中得到广泛应用。尤其是指纹支付功能,不仅可解决现有技术中数字密码容易被窃取的问题,而且输入更为快捷。由于指纹识别过程中,指纹认证成功即触发认证成功后的业务行为,针对用户无法判断其安全性的某恶意病毒网页,容易因个人的无意或被强行引导、误导进行指纹验证,造成不必要的人身安全信息泄露或财产损失,终端的安全性较低。为了解决这些技术问题,本申请实施例提供一种指纹认证方法、装置、设备及存储介质。With the rapid development of information technology, the use of terminals (such as mobile phones, tablet computers, etc.) is becoming more and more popular. As the standard technology on the terminal, fingerprint recognition technology is widely used in the functions of unlocking, awakening and mobile payment of the terminal. In particular, the fingerprint payment function can not only solve the problem that the digital password is easily stolen in the prior art, but also input faster. During the fingerprint identification process, the successful fingerprint authentication triggers the business behavior after the authentication is successful. For a malicious virus webpage where the user cannot judge its security, it is easy to perform fingerprint verification due to personal unintentional or forced guidance or misleading, resulting in unnecessary The safety of the terminal is low due to personal safety information leakage or property loss. In order to solve these technical problems, the embodiments of the present application provide a fingerprint authentication method, device, device and storage medium.
在介绍本申请实施例之前,下面先对本申请实施例的实施场景进行简单介绍:Before introducing the embodiments of the present application, the following briefly introduces the implementation scenarios of the embodiments of the present application:
场景实例一:Scenario example 1:
终端显示某恶意病毒网页,网页的前台程序为一个支付页面,此时正在等待验证用户指纹。但是该支付页面被伪装成其他显示形式,用户无法觉察到此页面是一个支付页面,并且该页面没有提供退出按钮。此时用户的习惯性行为是按下home键退出该页面,但当用户使用注册指纹手指点击home键时,指纹信息认证成功,进而触发指纹认证成功后的支付行为,造成用户不必要的财产损失。The terminal displays a malicious virus webpage. The front-end program of the webpage is a payment page. At this time, it is waiting to verify the user's fingerprint. However, the payment page is disguised as other display forms, and the user cannot perceive that this page is a payment page, and the page does not provide an exit button. At this time, the habitual behavior of the user is to press the home button to exit the page, but when the user clicks the home button with the registered fingerprint finger, the fingerprint information authentication succeeds, which in turn triggers the payment behavior after the fingerprint authentication succeeds, causing unnecessary property loss .
场景示例二:Scenario example 2:
终端显示某恶意病毒网页,网页的前台程序为一个支付页面,并且无退出按钮,正在等待验证用户指纹。该页面并未伪装成其他形式,用户情急之下通过按下Home键退出该页面,但当用户使用注册指纹手指点击Home键时,指纹信息验证成功,进而触发指纹认证成功后的支付行为,造成用户不必要的财产损失。The terminal displays a malicious virus webpage. The front-end program of the webpage is a payment page, and there is no exit button. It is waiting to verify the user's fingerprint. The page is not disguised as other forms. The user quits the page by pressing the Home button in anxiety, but when the user clicks the Home button with a registered fingerprint finger, the fingerprint information verification is successful, which in turn triggers the payment behavior after successful fingerprint authentication, resulting in User unnecessary property loss.
在上述示例应用场景中,或其他类似应用场景下,比如,其他需要用户指纹认证,进而引发用户私人信息泄露等场景,由于指纹认证成功后即触发指纹认证成功后的支付行为,进而造成了用户不必要的损失,为了解决上述问题,本申请提供一种指纹认证方法、装置、设备及存储介质。In the above example application scenarios, or other similar application scenarios, such as other scenarios that require user fingerprint authentication, which leads to the leakage of user private information, the successful payment of fingerprint authentication triggers payment after successful fingerprint authentication, which in turn causes users Unnecessary losses. In order to solve the above problems, this application provides a fingerprint authentication method, device, equipment, and storage medium.
基于上述应用场景,下面以具体地实施例对本申请的技术方案以及本申请的技术方案如何解决上述技术问题进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。下面将结合附图,对本申请的实施例进行描述。Based on the above application scenarios, the following describes in detail the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in specific embodiments. The following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. The embodiments of the present application will be described below with reference to the drawings.
实施例一Example one
图1是本申请一实施例提供的指纹认证方法的流程示意图,如图1所示,本实施例以该方法应用于终端来举例说明,该终端可以是移动电话,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等,该方法包括如下步骤:FIG. 1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of the present application. As shown in FIG. 1, this embodiment is illustrated by applying the method to a terminal. The terminal may be a mobile phone, a digital broadcasting terminal, and a message receiving and sending device. , Game consoles, tablet devices, medical devices, fitness equipment, personal digital assistants, etc., the method includes the following steps:
步骤S11:通过目标按键获取用户指纹信息,并对获取到的指纹信息进行认证。Step S11: Obtain the user fingerprint information through the target button, and authenticate the acquired fingerprint information.
步骤S12:若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则不触发指纹信息认证成功之后的业务行为。Step S12: If the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is not triggered.
针对步骤S11进行说明:The step S11 will be explained:
通过目标按键获取用户指纹信息的过程中,目标按键可以是Home键、返回键以及确认键等实体按键,同时,目标按键也可以是虚拟按键,比如悬浮球等,本申请实施例对目标按键的具体按键以及按键形式不做任何限制,只要能够通过目标按键获取到用户的指纹信息即可。可选的,目标按键为Home键、返回键或者确认键中的任一项。In the process of acquiring the user's fingerprint information through the target button, the target button may be a physical button such as a Home button, a return button, and a confirmation button. At the same time, the target button may also be a virtual button, such as a floating ball, etc. There are no restrictions on the specific buttons and button forms, as long as the user's fingerprint information can be obtained through the target button. Optionally, the target key is any of the Home key, Back key, or Confirm key.
通过用户对目标按键的相关操作,获取用户指纹信息,其中,用户对目标按键的相关操作可以是用户对目标按键的触摸操作,用户通过相关操作将用户指纹信息反馈至终端设备中的微控制单元,终端对用户指纹信息进行识别与认证。指纹识别即指通过比较不同指纹的细节特征点来进行鉴别,指纹识别技术涉及图像处理、模式识别、计算机视觉、数学形态学、小波分析等众多学科。由于每个人的指纹不同,且同一人的十指之间,指纹也有明显区别,因此指纹可用于身份鉴定。本申请实施例对指纹识别的具体方式不做任何限制,只要能够实现对用户指纹信息进行识别即可。The user's fingerprint information is obtained through the user's related operation on the target button, where the user's related operation on the target button may be the user's touch operation on the target button, and the user feeds back the user's fingerprint information to the micro control unit in the terminal device through the related operation , The terminal recognizes and authenticates the user's fingerprint information. Fingerprint recognition refers to the identification by comparing the detailed feature points of different fingerprints. Fingerprint recognition technology involves image processing, pattern recognition, computer vision, mathematical morphology, wavelet analysis and many other disciplines. Since each person's fingerprint is different, and there are obvious differences between the same person's ten fingers, the fingerprint can be used for identification. The embodiment of the present application does not limit the specific method of fingerprint identification, as long as it can identify the user's fingerprint information.
在一种可能的实施方式中,通过目标按键获取用户指纹信息,并对获取到的指纹信息进行认证,包括:获取合法的用户指纹模板;对用户指纹信息和用于指纹模板进行匹配。In a possible implementation manner, obtaining the user fingerprint information through the target button and authenticating the obtained fingerprint information includes: obtaining a legal user fingerprint template; matching the user fingerprint information with the fingerprint template.
用户在进行指纹认证之前,还需要获取合法的用户指纹模板,获取合法的用户指纹模板可以通过在终端中用户指纹触摸可采集用户指纹模板的目标按键获取,例如,用户可以通过在终端的设置中,使用右手食指对目标按键进行多次触摸,通过重复输入用户指纹信息对用户预设指纹信息进行注册,从而获取合法的用户指纹模板。本申请实施例对获取用户指纹模板的具体方式不做限制,另外,本申请实施例对获取的用户指纹模板的手指以及获取的用户指纹模板数量也不做限制,只要能够实现获取合法的用户指纹模板即可。Before performing fingerprint authentication, the user also needs to obtain a legal user fingerprint template. The legal user fingerprint template can be obtained by touching the user's fingerprint in the terminal to the target button that can collect the user fingerprint template. For example, the user can obtain , Use the right index finger to touch the target button multiple times, and register the preset fingerprint information of the user by repeatedly inputting the user fingerprint information, so as to obtain a legal user fingerprint template. The embodiment of the present application does not limit the specific method of acquiring the user fingerprint template. In addition, the embodiment of the present application also does not limit the fingers of the acquired user fingerprint template and the number of acquired user fingerprint templates, as long as the legal user fingerprint can be obtained Template.
通过用户对目标按键的相关操作,获取用户指纹信息之后,还需要对获取到的指纹信息进行认证,具体的,可以通过对用户指纹信息和用户指纹模板进行匹配,由于手指末端正面皮肤上有凸凹不平的纹路,蕴涵大量的信息。这些皮肤的纹路在图案、断点和交点上是各不相同的,在信息处理中将它们称作“特征”,而且这些特征具有唯一性和永久性,可以把某个人与其指纹一一对应起来。通过对用户指纹信息和用户指纹模板进行匹配,并可以根据用户指纹信息与用户指纹模板的相似度判断认证结果,若用户指纹信息和用户指纹模板匹配成功,则对用户指纹信息认证成功,若用户指纹信息和用户指纹模板匹配失败,则对用户指纹信息认证失败。本申请实施例对指纹信息认证方式不做任何限制,只要能够实现对获取到的用户指纹信息进行认证即可。After obtaining the user's fingerprint information through the user's related operation on the target button, the obtained fingerprint information also needs to be authenticated. Specifically, the user's fingerprint information and the user's fingerprint template can be matched, because there are bumps on the front skin of the finger end The uneven texture contains a lot of information. The patterns of these skins are different in patterns, breakpoints, and intersections, and they are called "features" in information processing, and these features are unique and permanent, and can correspond one person to their fingerprints one by one. . By matching the user fingerprint information with the user fingerprint template and judging the authentication result based on the similarity between the user fingerprint information and the user fingerprint template, if the user fingerprint information matches the user fingerprint template successfully, the user fingerprint information is successfully authenticated. If the fingerprint information and the user fingerprint template match fail, the user fingerprint information authentication fails. The embodiment of the present application does not make any limitation on the fingerprint information authentication method, as long as it can authenticate the acquired user fingerprint information.
对用户指纹信息认证可以通过终端设备的中央处理器(Central Processing Unit,CPU)实现,也可以通过终端设备的微控制单元(Microcontroller Unit,MCU)来实现,本申请实施例对用户指纹信息认证的具体实现方式不做限制。Authentication of user fingerprint information can be achieved through the central processing unit (CPU) of the terminal device, or through the microcontroller unit (MCU) of the terminal device. The specific implementation method is not limited.
对步骤S12进行说明:Step S12 will be explained:
经过步骤S11对获取到的用户指纹信息的认证,其对用户指纹信息的认证结果可以为对用户指纹信息认证成功或者对用户指纹信息认证失败,若对用户指纹信息认证失败,则不会触发指纹认证成功之后的业务行为,若需要继续执行指纹认证成功之后的业务行为,则需重新获取用户指纹信息并对获取到的指纹信息进行认证,本申请实施例对认证失败后的终端行为不做任何限制。After the authentication of the acquired user fingerprint information through step S11, the authentication result of the user fingerprint information may be that the authentication of the user fingerprint information is successful or the authentication of the user fingerprint information fails. If the authentication of the user fingerprint information fails, the fingerprint will not be triggered For the business behavior after the authentication is successful, if you need to continue to execute the business behavior after the fingerprint authentication is successful, you need to re-acquire the user fingerprint information and authenticate the acquired fingerprint information. The embodiments of this application do not do anything about the terminal behavior after the authentication fails limit.
若对指纹信息认证成功,则需要获取对目标按键的第一用户操作,在对指纹信息认证成功且获取到对目标按键的第一用户操作的情况下,不触发指 纹信息认证成功之后的业务行为,通过对触发指纹信息认证成功之后的业务行为的条件进一步限制,能够有效的避免由于用户误操作等引发的后续业务行为,提高了终端的可操作性以及安全性。例如,在上述示例场景中,在某恶意病毒网页,网页的前台程序为一个支付页面,支付页面为正常支付页面形式或被伪装成其他显示形式,等待用户指纹信息认证,若由于用户使用注册指纹手指触摸或点击home键导致指纹信息认证成功,则用户还可以通过第一用户操作,不触发指纹信息认证成功之后的支付行为,从而避免了用户不必要的财产损失。其中,获取对目标按键的第一用户操作可以通过终端设备中的MCU实现。If the fingerprint information authentication is successful, the first user operation on the target button needs to be obtained. In the case where the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the successful fingerprint information authentication is not triggered By further restricting the conditions that trigger the business behavior after the fingerprint information authentication is successful, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal. For example, in the above example scenario, on a malicious virus webpage, the front-end program of the webpage is a payment page, the payment page is in the form of a normal payment page or disguised as other display forms, waiting for user fingerprint information authentication, if the user uses If the finger touches or clicks the home button, the fingerprint information authentication succeeds, and the user can also operate through the first user without triggering the payment behavior after the fingerprint information authentication succeeds, thereby avoiding unnecessary property loss of the user. Wherein, acquiring the first user operation on the target key can be implemented by the MCU in the terminal device.
为了不触发指纹信息认证成功之后的业务行为,在一种可能的实施方式中,若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。可选的,业务行为是用户支付行为。下面以提示用户无法进行支付行为为例,对本发明实施例进行介绍,图2是本申请一实施例提供的操作界面示意图,如图2所示,在支付过程中,需要获取用户指纹信息,其中,界面201表示通过目标按键获取用户指纹信息,并对获取到的指纹信息认证成功,若用户想要阻止该次的支付行为,则可以对目标按键执行第一用户操作,其中,界面202表示获取到对目标按键的第一用户操作,终端推送提示消息212,提示用户已阻止当前支付行为。In order not to trigger the business behavior after the fingerprint information authentication is successful, in a possible implementation manner, if the fingerprint information authentication is successful and the first user operation on the target button is obtained, a prompt message is pushed to remind the user that the user cannot proceed Business behavior. Optionally, the business behavior is user payment behavior. The following describes an embodiment of the present invention by taking an example of prompting the user that payment cannot be performed. FIG. 2 is a schematic diagram of an operation interface provided by an embodiment of the present application. As shown in FIG. 2, during the payment process, the user ’s fingerprint information needs to be obtained. , The interface 201 indicates that the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated. If the user wants to prevent this payment behavior, the user can perform the first user operation on the target button, where the interface 202 indicates the acquisition To the first user operation on the target button, the terminal pushes a prompt message 212 to remind the user that the current payment behavior has been blocked.
若对指纹信息认证成功,但没有获取到第一用户操作,则触发指纹信息认证成功之后的业务行为,例如,在正常支付宝付款需要指纹认证的情况下,通过获取用户指纹信息,并对指纹信息认证成功,而且没有获取到第一用户操作,则支付宝付款成功,不影响触发正常情况下的指纹信息认证成功后的业务行为。If the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered. For example, in the case where normal Alipay payment requires fingerprint authentication, by acquiring the user fingerprint information and comparing the fingerprint information If the authentication is successful, and the operation of the first user is not obtained, Alipay makes a successful payment, which does not affect the business behavior after triggering the fingerprint information authentication under normal circumstances.
第一用户操作可以是对目标按键超过预设时长的触摸操作,可以是对目标按键的长按操作等,本申请实施例对第一用户操作不做具体限制,只要能够在对指纹认证成功且获取到第一用户操作,可以不触发指纹信息认证常规之后的业务行为即可。可选的,第一用户操作为对目标按键的按下操作。在对指纹信息认证成功后,用户对目标按键执行按下操作,则不触发指纹信息认证成功之后的业务行为。例如:在上述实例场景中,某恶意病毒网页,网页的前台程序为一个支付页面,支付页面为正常支付页面形式或被伪装成其 他显示形式,等待用户指纹信息认证,尽管由于用户使用注册指纹手指触摸home键导致指纹信息认证成功,但用户还可以通过按下home键的操作,阻止终端触发指纹信息认证成功之后的支付行为,从而避免了用户不必要的财产损失。The first user operation may be a touch operation on the target key exceeding a preset duration, or a long press operation on the target key, etc. The embodiment of the present application does not specifically limit the operation of the first user, as long as the fingerprint authentication is successful and The first user operation can be acquired without triggering the business behavior after the fingerprint information authentication routine. Optionally, the first user operation is a pressing operation on the target key. After the fingerprint information authentication is successful, the user performs a pressing operation on the target key, and the business behavior after the fingerprint information authentication is successful is not triggered. For example: In the above example scenario, a malicious virus webpage, the front-end program of the webpage is a payment page, the payment page is in the form of a normal payment page or disguised as other display forms, waiting for the user's fingerprint information to be authenticated, although the user uses the registered fingerprint finger Touching the home button results in successful fingerprint information authentication, but the user can also press the home button to prevent the terminal from triggering payment after the fingerprint information authentication is successful, thereby avoiding unnecessary property loss for the user.
在一种可能的实施方式中,在对指纹信息认证成功之后,为了阻止触发指纹认证成功之后的业务行为,第一用户操作还可以是注册指纹手指触摸目标按键超过预设时长。比如,在对获取到的用户指纹信息认证成功之后,注册指纹手指触摸目标按键超过预设时长,则不触发指纹认证成功之后的业务行为。In a possible implementation manner, after the fingerprint information is successfully authenticated, in order to prevent the business behavior after triggering the successful fingerprint authentication, the first user operation may also be that the registered fingerprint finger touches the target key for more than a preset duration. For example, after the authentication of the obtained user fingerprint information is successful, the registered fingerprint finger touches the target button for more than a preset duration, and the business behavior after the successful fingerprint authentication is not triggered.
在本申请实施例中,由于本申请实施例可以通过在指纹信息认证成功之后,获取到第一用户操作,则不触发指纹信息认证成功之后的业务行为,实现了对指纹信息认证成功之后的是否触发相应的业务行为进行人工控制,有效的避免了由于误操作等造成违背用户意愿的业务行为,进而提高了终端的安全性和可靠性。In the embodiment of the present application, since the embodiment of the present application can obtain the first user operation after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is not triggered, and whether the fingerprint information is successfully authenticated is achieved. Trigger the corresponding business behavior for manual control, which effectively avoids business behavior that violates the user's wishes due to misoperation, etc., thereby improving the security and reliability of the terminal.
实施例二Example 2
在上述实施例一的基础上,图3是本申请另一实施例提供的指纹认证方法的流程示意图,本实施例以该方法应用于终端来举例说明,该终端可以是移动电话,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等,如图3所示,本申请提供的指纹认证方法还包括:On the basis of the first embodiment described above, FIG. 3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application. In this embodiment, the method is applied to a terminal for illustration. The terminal may be a mobile phone or a digital broadcasting terminal. , Messaging devices, game consoles, tablet devices, medical devices, fitness equipment, personal digital assistants, etc. As shown in Figure 3, the fingerprint authentication method provided in this application also includes:
步骤S21:若对指纹信息认证成功,且获取到对目标按键的第二用户操作,则触发指纹信息认证成功之后的业务行为。Step S21: If the fingerprint information authentication is successful, and a second user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is triggered.
经过步骤S11对获取到的用户指纹信息的认证,若对指纹信息认证成功,则需要获取对目标按键的第二用户操作,在对指纹信息认证成功且获取到第二用户操作的情况下,触发指纹信息认证成功之后的业务行为,通过对触发指纹信息认证成功之后的业务行为的条件进一步限制,能够有效的避免由于用户误操作等引发的后续业务行为,提高了终端的可操作性以及安全性。例如,在正常支付宝付款需要指纹认证的情况下,通过获取用户指纹信息,并对指纹信息认证成功,而且获取到对目标按键的第二用户操作,则支付宝付款成功,不影响触发正常情况下的指纹信息认证成功后的业务行为。图4是 本申请另一实施例提供的操作界面示意图,如图4所示,例如,在正常支付宝付款需要指纹认证的情况下,需要获取用户指纹信息,并对指纹信息进行认证,界面401表示通过目标按键获取用户指纹信息,并对获取到的指纹信息认证成功,在正常支付的情况下,用户对终端执行第二用户操作,用户界面402表示在对指纹信息认证成功之后,获取到对目标按键的第二用户操作,则触发指纹信息认证成功之后的支付行为。在触发指纹信息认证成功之后的业务行为之后,还可以通过推送消息412,提示用户支付成功。After the authentication of the acquired user fingerprint information through step S11, if the fingerprint information authentication is successful, a second user operation on the target key needs to be acquired. In the case where the fingerprint information authentication is successful and the second user operation is acquired, trigger The business behavior after the fingerprint information authentication succeeds, by further restricting the conditions that trigger the business behavior after the fingerprint information authentication succeeds, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal . For example, in the case where normal Alipay payment requires fingerprint authentication, by acquiring the user's fingerprint information and authenticating the fingerprint information, and acquiring the second user operation on the target button, Alipay's payment is successful and does not affect the triggering of the normal case Business behavior after successful fingerprint information authentication. FIG. 4 is a schematic diagram of an operation interface provided by another embodiment of the present application. As shown in FIG. 4, for example, in the case where normal Alipay payment requires fingerprint authentication, the user ’s fingerprint information needs to be obtained and the fingerprint information is authenticated. Interface 401 shows The user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated. In the case of normal payment, the user performs a second user operation on the terminal. The user interface 402 indicates that after the fingerprint information is successfully authenticated, the target The second user operation of the button triggers the payment behavior after the fingerprint information authentication is successful. After triggering the business behavior after the fingerprint information authentication is successful, the user may also be prompted to push the payment successfully through the push message 412.
第二用户操作可以是对目标按键的触摸操作,可以是对目标按键的按下操作等,本申请实施例对第二用户操作不做具体限制,只要能够在对指纹认证成功且获取到第二用户操作,可以触发指纹信息认证常规之后的业务行为即可。可选的,第二用户操作为用户从目标按键移开手指的操作。例如,在正常支付宝付款需要指纹认证的情况下,通过获取用户指纹信息,并对指纹信息认证成功,而且用户从目标按键移开手指,则支付宝付款成功,不影响触发正常情况下的指纹信息认证成功后的业务行为。获取对目标按键的第二用户操作可以通过终端设备中的MCU来实现。The second user operation may be a touch operation on the target key, or may be a pressing operation on the target key, etc. The embodiment of the present application does not specifically limit the operation of the second user, as long as the fingerprint authentication is successful and the second The user operation can trigger the business behavior after the fingerprint information authentication routine. Optionally, the second user operation is an operation in which the user removes the finger from the target key. For example, in the case where normal Alipay payment requires fingerprint authentication, by acquiring the user's fingerprint information and authenticating the fingerprint information, and the user removes the finger from the target button, the Alipay payment is successful, which does not affect the fingerprint information authentication under normal circumstances Business behavior after success. Acquiring the second user operation on the target key can be implemented by the MCU in the terminal device.
本申请实施例对第一用户操作和第二用户操作不做具体限制,只要终端能够根据第一用户操作或第二用户操作进行相应的不触发或触发指纹认证成功之后的业务行为即可。The embodiments of the present application do not specifically limit the operation of the first user and the operation of the second user, as long as the terminal can perform corresponding non-trigger or trigger business operations after successful fingerprint authentication according to the first user operation or the second user operation.
在本申请实施例中,由于本申请实施例可以通过在指纹信息认证成功之后,获取到第二用户操作,则触发指纹信息认证成功之后的业务行为,有效的避免了由于误操作等造成违背用户意愿的业务行为,进而提高了终端的安全性和可靠性。In the embodiment of the present application, since the embodiment of the present application can obtain the operation of the second user after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is triggered, which effectively avoids the violation of the user due to misoperation and the like Willing business behavior, thereby improving the security and reliability of the terminal.
实施例三Example Three
本申请实施例还提供一种指纹认证装置,图5是本申请一实施例提供的指纹认证装置的示意图,本实施例以该方法应用于终端来举例说明,该终端可以是移动电话,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等,如图5所示,本申请实施例提供的指纹认证装置包括:An embodiment of the present application also provides a fingerprint authentication device. FIG. 5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application. In this embodiment, the method is applied to a terminal for illustration. The terminal may be a mobile phone or a digital broadcast. Terminals, messaging devices, game consoles, tablet devices, medical equipment, fitness equipment, personal digital assistants, etc. As shown in FIG. 5, the fingerprint authentication device provided by the embodiment of the present application includes:
获取模块51,用于通过目标按键获取用户指纹信息,认证模块52,用于对获取到的指纹信息进行认证;第一处理模块53,用于若对指纹信息认证成 功,且获取到对目标按键的第一用户操作,则不触发指纹信息认证成功之后的业务行为。The obtaining module 51 is used to obtain user fingerprint information through the target button, and the authentication module 52 is used to authenticate the obtained fingerprint information; the first processing module 53 is used to authenticate the fingerprint information and obtain the target button The first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
可选的,第一用户操作为用户对目标按键的按下操作。Optionally, the first user operation is a user's pressing operation on the target key.
可选的,本申请提供的指纹认证装置还包括:Optionally, the fingerprint authentication device provided in this application further includes:
第二处理模块54,用于若对指纹信息认证成功,且获取到第二用户操作,则触发指纹信息认证成功之后的业务行为。The second processing module 54 is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and the second user operation is acquired.
可选的,第二用户操作为用户从目标按键移开手指的操作。Optionally, the second user operation is an operation in which the user removes the finger from the target key.
可选的,目标按键为Home键、返回键或者确认键中的任一项。认证模块具体用于:Optionally, the target key is any of the Home key, Back key, or Confirm key. The authentication module is specifically used for:
获取合法的用户指纹模板;对用户指纹信息和用户指纹模板进行匹配。Obtain legal user fingerprint templates; match user fingerprint information with user fingerprint templates.
本申请实施例体用的指纹认证装置,还包括:The fingerprint authentication device used in the embodiments of the present application further includes:
推送模块55,用于若对指纹信息认证成功,且获取到对目标按键的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。The pushing module 55 is configured to, if the fingerprint information authentication is successful and the first user operation on the target button is obtained, push the prompt information to remind the user that the business operation cannot be performed.
可选的,业务行为是用户支付行为。Optionally, the business behavior is user payment behavior.
本申请实施例提供的指纹认证装置可用于执行上述的指纹认证方法,其内容和效果可参考方法部分,本申请实施例对此不做限制。The fingerprint authentication device provided by the embodiment of the present application may be used to execute the above-mentioned fingerprint authentication method. For the content and effect, refer to the method section. The embodiment of the present application does not limit this.
实施例四Example 4
本申请提供一种指纹识别模组,图6是本申请一实施例提供的指纹识别模组的结构示意图,如图6所示,本申请提供的指纹识别模组包括:目标按键61和微控制单元MCU62。This application provides a fingerprint identification module. FIG. 6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the application. As shown in FIG. 6, the fingerprint identification module provided by the application includes: a target button 61 and a micro control Unit MCU62.
MCU62用于:通过目标按键61获取用户指纹信息,对指纹信息进行认证,并将认证结果发送给处理器;若通过目标按键61获取到第一用户操作,则将第一用户操作发送给处理器,以使处理器根据认证结果确定对指纹信息认证成功时,根据第一用户操作不触发指纹信息认证成功之后的业务行为。The MCU 62 is used to obtain the user fingerprint information through the target button 61, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button 61, the first user operation is sent to the processor , So that the processor does not trigger the business behavior after the fingerprint information authentication succeeds according to the first user operation when the processor determines that the fingerprint information authentication is successful according to the authentication result.
可选的,第一用户操作为用户对目标按键61的按下操作。Optionally, the first user operation is a user's pressing operation on the target button 61.
可选的,MCU62还用于:Optionally, MCU62 is also used for:
若通过目标按键61获取到第二用户操作,则将第二用户操作发送给处理器,以使处理器根据认证结果确定对指纹信息认证成功时,根据第二用户操作触发指纹信息认证成功之后的业务行为。If the second user operation is acquired through the target button 61, the second user operation is sent to the processor, so that when the processor determines that fingerprint information authentication is successful according to the authentication result, the fingerprint information authentication is triggered according to the second user operation Business behavior.
其中,MCU62的个数可以为一个或两个以上,例如,MCU62的数量为 1个,则该MCU62用于获取用户指纹信息且对指纹信息进行认证,并将认证结果发送给处理器,还用于获取第一用户操作,并将第一用户操作发送给处理器,还用于获取第二用户操作,并将第二用户操作发送给处理器。再例如,MCU62的数量为2个,则可以为第一个MCU62用于获取用户指纹信息且将指纹信息进行认证,并将认证结果发送给处理器,第二个MCU62用于获取用户指纹信息且对指纹信息进行认证,并将认证结果发送给处理器,还用于获取第一用户操作,并将第一用户操作发送给处理器,还用于获取第二用户操作,并将第二用户操作发送给处理器,本发明对MCU62数量为两个时,每个MCU62负责的工作不做限制,只要能够实现本申请技术方案即可。再例如,MCU62数量为3个,则可以为第一个MCU62用于获取用户指纹信息且将指纹信息进行认证,并将认证结果发送给处理器,第二个MCU62用于获取用户指纹信息且对指纹信息进行认证,并将认证结果发送给处理器,第三个MCU62用于获取第二用户操作,并将第二用户操作发送给处理器。Among them, the number of MCU62 can be one or more than two, for example, the number of MCU62 is one, then the MCU62 is used to obtain user fingerprint information and authenticate fingerprint information, and send the authentication result to the processor, and also use It is used to acquire the first user operation and send the first user operation to the processor, and also used to acquire the second user operation and send the second user operation to the processor. For another example, if the number of MCU62 is 2, the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor, and the second MCU62 can be used to obtain user fingerprint information and Authenticate fingerprint information, send the authentication result to the processor, also used to obtain the first user operation, send the first user operation to the processor, also used to obtain the second user operation, and operate the second user Sent to the processor. In the present invention, when the number of MCU 62 is two, the work that each MCU 62 is responsible for does not limit, as long as the technical solution of the present application can be realized. For another example, if the number of MCU62 is three, the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor, and the second MCU62 is used to obtain user fingerprint information and The fingerprint information is authenticated, and the authentication result is sent to the processor. The third MCU 62 is used to obtain the second user operation, and the second user operation is sent to the processor.
可选的,第二用户操作为用户从目标按键61移开手指的操作。Optionally, the second user operation is an operation in which the user removes the finger from the target button 61.
可选的,MCU62具体用于:Optionally, MCU62 is specifically used for:
获取合法的用户指纹模板;对用户指纹信息和用户指纹模板进行匹配。Obtain legal user fingerprint templates; match user fingerprint information with user fingerprint templates.
可选的,MCU62还用于:Optionally, MCU62 is also used for:
若对指纹信息认证成功,且获取到对目标按键61的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button 61 is obtained, the prompt information is pushed to remind the user that the business operation cannot be performed.
可选的,业务行为是用户支付行为。Optionally, the business behavior is user payment behavior.
可选的,目标按键61为Home键、返回键或者确认键中的任一项。Optionally, the target button 61 is any one of the Home button, the Back button, or the Confirm button.
本申请实施例提供的指纹识别模组可用于执行上述的指纹认证方法,其内容和效果可参考方法部分,本申请实施例对此不做限制。The fingerprint identification module provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method, and the content and effect may refer to the method section, which is not limited by the embodiment of the present application.
实施例五Example 5
本申请一实施例还提供一种终端设备,图7是本申请一实施例提供的终端设备的结构示意图,如图7所示,终端设备包括:指纹识别模组71和处理器72,指纹识别模组71包括:目标按键711和微控制单元712MCU712用于:An embodiment of the present application also provides a terminal device. FIG. 7 is a schematic structural diagram of the terminal device according to an embodiment of the present application. As shown in FIG. 7, the terminal device includes: a fingerprint identification module 71 and a processor 72, fingerprint identification Module 71 includes: target button 711 and micro control unit 712MCU712 for:
通过目标按键711获取用户指纹信息,并对获取到的指纹信息进行认证,向处理器72发送认证结果;若通过目标按键711获取到第一用户操作,则将第一用户操作发送给处理器72。Obtain user fingerprint information through the target button 711, and authenticate the acquired fingerprint information, and send the authentication result to the processor 72; if the first user operation is obtained through the target button 711, the first user operation is sent to the processor 72 .
处理器72用于:若根据认证结果对指纹信息认证成功,则根据第一用户操作则不触发指纹信息认证成功之后的业务行为。The processor 72 is configured to: if the fingerprint information is successfully authenticated according to the authentication result, according to the first user operation, the business behavior after the successful fingerprint information authentication is not triggered.
可选的,第一用户操作为用户对目标按键711的按下操作。Optionally, the first user operation is a user's pressing operation on the target button 711.
可选的,MCU712还用于:Optionally, MCU712 is also used for:
若通过目标按键711获取到第二用户操作,则将第二用户操作发送给处理器72;If the second user operation is acquired through the target button 711, the second user operation is sent to the processor 72;
处理器72,还用于若根据认证结果确定对指纹信息认证成功时,根据第二用户操作触发指纹信息认证成功之后的业务行为。The processor 72 is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
可选的,第二用户操作为用户从目标按键711移开手指的操作。Optionally, the second user operation is an operation in which the user removes the finger from the target button 711.
可选的,MCU712具体用于:Optionally, MCU712 is specifically used for:
获取合法的用户指纹模板;对用户指纹信息和用户指纹模板进行匹配。Obtain legal user fingerprint templates; match user fingerprint information with user fingerprint templates.
可选的,MCU712还用于:Optionally, MCU712 is also used for:
若对指纹信息认证成功,且获取到对目标按键711的第一用户操作,则推送提示信息,以提示用户无法进行业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button 711 is obtained, the prompt information is pushed to remind the user that the business operation cannot be performed.
可选的,业务行为是用户支付行为。Optionally, the business behavior is user payment behavior.
可选的,目标按键711为Home键、返回键或者确认键中的任一项。Optionally, the target button 711 is any one of the Home button, the Back button, or the Confirm button.
本申请实施例提供的终端设备可用于执行上述的指纹认证方法,其内容和效果可参考方法部分,本申请实施例对此不做限制。The terminal device provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method. For the content and effect, refer to the method section, which is not limited by the embodiment of the present application.
实施例六Example Six
本申请一实施例还提供一种计算机存储介质,存储介质包括计算机指令,当指令被计算机执行时,使得计算机实现如上述的指纹认证方法。An embodiment of the present application further provides a computer storage medium. The storage medium includes computer instructions. When the instructions are executed by the computer, the computer is enabled to implement the fingerprint authentication method as described above.
实施例七Example 7
本申请一实施例还提供一种计算机程序产品,包括:计算机指令,当指令被计算机执行时,使得计算机实现如上述的指纹认证方法。An embodiment of the present application further provides a computer program product, including: computer instructions, which when executed by the computer, cause the computer to implement the fingerprint authentication method as described above.
本领域普通技术人员可以理解:实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一计算机可读取存储介质中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Persons of ordinary skill in the art may understand that all or part of the steps of the foregoing method embodiments may be completed by a program instructing relevant hardware. The aforementioned program may be stored in a computer-readable storage medium. When the program is executed, the steps including the foregoing method embodiments are executed; and the foregoing storage medium includes various media that can store program codes, such as ROM, RAM, magnetic disk, or optical disk.
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对 其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention, rather than limiting it; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: The technical solutions described in the foregoing embodiments can still be modified, or some or all of the technical features can be equivalently replaced; and these modifications or replacements do not deviate from the essence of the corresponding technical solutions of the technical solutions of the embodiments of the present invention. range.

Claims (33)

  1. 一种指纹认证方法,其特征在于,包括:A fingerprint authentication method, characterized in that it includes:
    通过目标按键获取用户指纹信息,并对获取到的所述指纹信息进行认证;Obtain the user's fingerprint information through the target button, and authenticate the acquired fingerprint information;
    若对所述指纹信息认证成功,且获取到对所述目标按键的第一用户操作,则不触发所述指纹信息认证成功之后的业务行为。If the fingerprint information authentication is successful, and the first user operation on the target key is acquired, the business behavior after the fingerprint information authentication is successful is not triggered.
  2. 根据权利要求1所述的方法,其特征在于,所述第一用户操作为用户对所述目标按键的按下操作。The method according to claim 1, wherein the first user operation is a user's pressing operation on the target key.
  3. 根据权利要求1所述的方法,其特征在于,还包括:The method according to claim 1, further comprising:
    若对所述指纹信息认证成功,且获取到对所述目标按键的第二用户操作,则触发所述指纹信息认证成功之后的业务行为。If the fingerprint information authentication is successful, and a second user operation on the target key is acquired, the business behavior after the fingerprint information authentication succeeds is triggered.
  4. 根据权利要求3所述的方法,其特征在于,所述第二用户操作为用户从所述目标按键移开手指的操作。The method according to claim 3, wherein the second user operation is an operation in which the user removes a finger from the target key.
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述通过目标按键获取用户指纹信息,并对获取到的所述指纹信息进行认证,包括:The method according to any one of claims 1 to 4, wherein the acquiring user fingerprint information through a target key and authenticating the acquired fingerprint information includes:
    获取合法的用户指纹模板;Obtain legal user fingerprint templates;
    对所述用户指纹信息和用户指纹模板进行匹配。Matching the user fingerprint information with the user fingerprint template.
  6. 根据权利要求1-4任一项所述的方法,其特征在于,还包括:The method according to any one of claims 1-4, further comprising:
    若对所述指纹信息认证成功,且获取到对所述目标按键的第一用户操作,则推送提示信息,以提示用户无法进行所述业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button is obtained, a prompt message is pushed to remind the user that the business action cannot be performed.
  7. 根据权利要求1-4任一项所述的方法,其特征在于,所述业务行为是用户支付行为。The method according to any one of claims 1-4, wherein the business behavior is a user payment behavior.
  8. 根据权利要求1-4任一项所述的方法,其特征在于,所述目标按键为Home键、返回键或者确认键中的任一项。The method according to any one of claims 1 to 4, wherein the target key is any one of a Home key, a back key, or a confirmation key.
  9. 一种指纹认证装置,其特征在于,包括:A fingerprint authentication device, characterized in that it includes:
    获取模块,用于通过目标按键获取用户指纹信息;The acquisition module is used to acquire the user's fingerprint information through the target button;
    认证模块,用于对获取到的所述指纹信息进行认证;An authentication module, configured to authenticate the fingerprint information obtained;
    第一处理模块,用于若对所述指纹信息认证成功,且获取到对所述目标按键的第一用户操作,则不触发所述指纹信息认证成功之后的业务行为。The first processing module is configured to not trigger the business behavior after the fingerprint information authentication succeeds if the fingerprint information authentication is successful and the first user operation on the target key is acquired.
  10. 根据权利要求9所述的装置,其特征在于,所述第一用户操作为用户对所述目标按键的按下操作。The device according to claim 9, wherein the first user operation is a user's pressing operation on the target key.
  11. 根据权利要求9所述的装置,其特征在于,还包括:The device according to claim 9, further comprising:
    第二处理模块,用于若对所述指纹信息认证成功,且获取到对所述目标按键的第二用户操作,则触发所述指纹信息认证成功之后的业务行为。The second processing module is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and a second user operation on the target key is acquired.
  12. 根据权利要求11所述的装置,其特征在于,所述第二用户操作为用户从所述目标按键移开手指的操作。The apparatus according to claim 11, wherein the second user operation is an operation in which the user removes a finger from the target key.
  13. 根据权利要求9-12任一项所述的装置,其特征在于,所述认证模块具体用于:The device according to any one of claims 9-12, wherein the authentication module is specifically configured to:
    获取合法的用户指纹模板;Obtain legal user fingerprint templates;
    对所述用户指纹信息和用户指纹模板进行匹配。Matching the user fingerprint information with the user fingerprint template.
  14. 根据权利要求9-12任一项所述的装置,其特征在于,还包括:The device according to any one of claims 9-12, further comprising:
    推送模块,用于若对所述指纹信息认证成功,且获取到对所述目标按键的第一用户操作,则推送提示信息,以提示用户无法进行所述业务行为。The pushing module is configured to push prompt information to prompt the user that the business behavior cannot be performed if the fingerprint information is successfully authenticated and the first user operation on the target key is acquired.
  15. 根据权利要求9-12任一项所述的装置,其特征在于,所述业务行为是用户支付行为。The apparatus according to any one of claims 9-12, wherein the business behavior is a user payment behavior.
  16. 根据权利要求9-12任一项所述的装置,其特征在于,所述目标按键为Home键、返回键或者确认键中的任一项。The device according to any one of claims 9-12, wherein the target key is any one of a Home key, a return key, or a confirmation key.
  17. 一种指纹识别模组,其特征在于,包括:目标按键和微控制单元MCU;A fingerprint identification module, which is characterized by comprising: a target button and a micro control unit MCU;
    所述MCU用于:The MCU is used for:
    通过所述目标按键获取用户指纹信息,对所述指纹信息进行认证,并将认证结果发送给处理器;Acquiring user fingerprint information through the target button, authenticating the fingerprint information, and sending the authentication result to the processor;
    若通过所述目标按键获取到第一用户操作,则将所述第一用户操作发送给所述处理器,以使所述处理器根据所述认证结果确定对所述指纹信息认证成功时,根据所述第一用户操作不触发所述指纹信息认证成功之后的业务行为。If the first user operation is acquired through the target key, the first user operation is sent to the processor, so that the processor determines that the fingerprint information authentication is successful according to the authentication result, according to The first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
  18. 根据权利要求17所述的指纹识别模组,其特征在于,所述第一用户操作为用户对所述目标按键的按下操作。The fingerprint identification module according to claim 17, wherein the first user operation is a user's pressing operation on the target key.
  19. 根据权利要求17所述的指纹识别模组,其特征在于,所述MCU还用于:The fingerprint identification module according to claim 17, wherein the MCU is further used for:
    若通过所述目标按键获取到第二用户操作,则将所述第二用户操作发送给所述处理器,以使所述处理器根据所述认证结果确定对所述指纹信息认证 成功时,根据所述第二用户操作触发所述指纹信息认证成功之后的业务行为。If the second user operation is obtained through the target key, the second user operation is sent to the processor, so that the processor determines that the fingerprint information authentication is successful according to the authentication result, according to The second user operation triggers the business behavior after the fingerprint information authentication is successful.
  20. 根据权利要求19所述的指纹识别模组,其特征在于,所述第二用户操作为用户从所述目标按键移开手指的操作。The fingerprint identification module according to claim 19, wherein the second user operation is an operation in which the user removes a finger from the target key.
  21. 根据权利要求17-20任一项所述的指纹识别模组,其特征在于,所述MCU具体用于:The fingerprint identification module according to any one of claims 17-20, wherein the MCU is specifically used for:
    获取合法的用户指纹模板;Obtain legal user fingerprint templates;
    对所述用户指纹信息和用户指纹模板进行匹配。Matching the user fingerprint information with the user fingerprint template.
  22. 根据权利要求17-20任一项所述的指纹识别模组,其特征在于,所述MCU还用于:The fingerprint identification module according to any one of claims 17-20, wherein the MCU is further used to:
    若对所述指纹信息认证成功,且获取到对所述目标按键的第一用户操作,则推送提示信息,以提示用户无法进行所述业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button is obtained, a prompt message is pushed to remind the user that the business action cannot be performed.
  23. 根据权利要求17-20任一项所述的指纹识别模组,其特征在于,所述业务行为是用户支付行为。The fingerprint identification module according to any one of claims 17-20, wherein the business behavior is a user payment behavior.
  24. 根据权利要求17-20任一项所述的指纹识别模组,其特征在于,所述目标按键为Home键、返回键或者确认键中的任一项。The fingerprint identification module according to any one of claims 17-20, wherein the target key is any one of a Home key, a return key, or a confirmation key.
  25. 一种终端设备,其特征在于,包括:指纹识别模组和处理器,所述指纹识别模组包括:目标按键和微控制单元MCU;A terminal device, characterized by comprising: a fingerprint identification module and a processor, the fingerprint identification module comprising: a target key and a micro control unit MCU;
    所述MCU用于:The MCU is used for:
    通过所述目标按键获取用户指纹信息,并对获取到的所述指纹信息进行认证,向所述处理器发送认证结果;Acquiring user fingerprint information through the target button, and authenticating the acquired fingerprint information, and sending an authentication result to the processor;
    若通过所述目标按键获取到第一用户操作,则将所述第一用户操作发送给所述处理器;If the first user operation is acquired through the target key, the first user operation is sent to the processor;
    所述处理器用于:The processor is used for:
    若根据所述认证结果确定对所述指纹信息认证成功,则根据所述第一用户操作不触发所述指纹信息认证成功之后的业务行为。If it is determined that the fingerprint information is successfully authenticated according to the authentication result, the business behavior after the fingerprint information authentication is successful is not triggered according to the first user operation.
  26. 根据权利要求25所述的终端设备,其特征在于,所述第一用户操作为用户对所述目标按键的按下操作。The terminal device according to claim 25, wherein the first user operation is a user's pressing operation on the target key.
  27. 根据权利要求25所述的终端设备,其特征在于,The terminal device according to claim 25, wherein
    所述MCU,还用于若通过所述目标按键获取到第二用户操作,则将所述第二用户操作发送给所述处理器;The MCU is further configured to send the second user operation to the processor if the second user operation is acquired through the target button;
    所述处理器,还用于若根据所述认证结果确定对所述指纹信息认证成功时,根据所述第二用户操作触发所述指纹信息认证成功之后的业务行为。The processor is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the second user operation if it is determined that the fingerprint information authentication is successful according to the authentication result.
  28. 根据权利要求27所述的终端设备,其特征在于,所述第二用户操作为用户从所述目标按键移开手指的操作。The terminal device according to claim 27, wherein the second user operation is an operation in which the user removes a finger from the target key.
  29. 根据权利要求25-28任一项所述的终端设备,其特征在于,所述MCU具体用于:The terminal device according to any one of claims 25 to 28, wherein the MCU is specifically used to:
    获取合法的用户指纹模板;Obtain legal user fingerprint templates;
    对所述用户指纹信息和用户指纹模板进行匹配。Matching the user fingerprint information with the user fingerprint template.
  30. 根据权利要求25-28任一项所述的终端设备,其特征在于,所述MCU还用于:The terminal device according to any one of claims 25 to 28, wherein the MCU is further used to:
    若对所述指纹信息认证成功,且获取到对所述目标按键的第一用户操作,则推送提示信息,以提示用户无法进行所述业务行为。If the fingerprint information is successfully authenticated and the first user operation on the target button is obtained, a prompt message is pushed to remind the user that the business action cannot be performed.
  31. 根据权利要求25-28任一项所述的终端设备,其特征在于,所述业务行为是用户支付行为。The terminal device according to any one of claims 25 to 28, wherein the business behavior is a user payment behavior.
  32. 根据权利要求25-28任一项所述的终端设备,其特征在于,所述目标按键为Home键、返回键或者确认键中的任一项。The terminal device according to any one of claims 25 to 28, wherein the target key is any one of a Home key, a return key, or a confirmation key.
  33. 一种计算机存储介质,其特征在于,所述存储介质包括计算机指令,当所述指令被计算机执行时,使得所述计算机实现如权利要求1至8中任一项权利要求所述的指纹认证方法。A computer storage medium, characterized in that the storage medium includes computer instructions, which when executed by a computer, causes the computer to implement the fingerprint authentication method according to any one of claims 1 to 8. .
PCT/CN2018/113803 2018-11-02 2018-11-02 Fingerprint verification method and apparatus, device and storage medium WO2020087527A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/113803 WO2020087527A1 (en) 2018-11-02 2018-11-02 Fingerprint verification method and apparatus, device and storage medium
CN201880002045.9A CN109564604A (en) 2018-11-02 2018-11-02 Fingerprint verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/113803 WO2020087527A1 (en) 2018-11-02 2018-11-02 Fingerprint verification method and apparatus, device and storage medium

Publications (1)

Publication Number Publication Date
WO2020087527A1 true WO2020087527A1 (en) 2020-05-07

Family

ID=65872625

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/113803 WO2020087527A1 (en) 2018-11-02 2018-11-02 Fingerprint verification method and apparatus, device and storage medium

Country Status (2)

Country Link
CN (1) CN109564604A (en)
WO (1) WO2020087527A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117631A (en) * 2015-08-24 2015-12-02 联想(北京)有限公司 Information processing method and electronic device
CN105210072A (en) * 2013-05-14 2015-12-30 Lg电子株式会社 Portable device including a fingerprint scanner and method of controlling therefor
CN105989495A (en) * 2016-03-07 2016-10-05 李明 Payment method and system
CN106062701A (en) * 2016-04-12 2016-10-26 深圳信炜科技有限公司 Electronic device
US20160335469A1 (en) * 2014-04-10 2016-11-17 Kuo-Ching Chiang Portable Device with Security Module

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8060413B2 (en) * 2008-03-14 2011-11-15 Research In Motion Limited System and method for making electronic payments from a wireless mobile device
CN107066197A (en) * 2017-03-08 2017-08-18 广东欧珀移动通信有限公司 The control method and terminal device of terminal device
CN107133799A (en) * 2017-04-28 2017-09-05 上海与德科技有限公司 A kind of method of payment and device based on biological characteristic
CN108156310A (en) * 2017-11-27 2018-06-12 深圳市金立通信设备有限公司 A kind of method and system of finger prints processing, terminal device and computer-readable medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105210072A (en) * 2013-05-14 2015-12-30 Lg电子株式会社 Portable device including a fingerprint scanner and method of controlling therefor
US20160335469A1 (en) * 2014-04-10 2016-11-17 Kuo-Ching Chiang Portable Device with Security Module
CN105117631A (en) * 2015-08-24 2015-12-02 联想(北京)有限公司 Information processing method and electronic device
CN105989495A (en) * 2016-03-07 2016-10-05 李明 Payment method and system
CN106062701A (en) * 2016-04-12 2016-10-26 深圳信炜科技有限公司 Electronic device

Also Published As

Publication number Publication date
CN109564604A (en) 2019-04-02

Similar Documents

Publication Publication Date Title
US10482230B2 (en) Face-controlled liveness verification
KR102387568B1 (en) Method and apparatus for authentication based on fingerprint recognition
JP2017530457A (en) Identity authentication method and apparatus, terminal and server
US10644887B2 (en) Identity validity verification method, apparatus and system
CN105825382A (en) Mobile payment method and electronic device
CN105160227A (en) Remote fingerprint verification method, user terminal and fingerprint verification system
US20190130411A1 (en) Method and system for data processing
CN109145558B (en) Unlocking control method and electronic device
CN105678147B (en) Touch operation method and device
CN107533598B (en) Input method and device of login password of application program and terminal
WO2021244531A1 (en) Payment method and apparatus based on facial recognition
CN104951677B (en) Information processing method and device
JP6399605B2 (en) Authentication apparatus, authentication method, and program
CN108133129A (en) A kind of unlocking method of application program, device and mobile terminal
WO2016062200A1 (en) Fingerprint authentication method and apparatus, and server
CN104063651B (en) Authentication and issuing means and authentication and submission method
CN105653993A (en) Password inputting method, apparatus and electronic device
CN107786349B (en) Security management method and device for user account
CN109543431B (en) Application encryption method and device, electronic equipment and storage medium
WO2020087527A1 (en) Fingerprint verification method and apparatus, device and storage medium
WO2016095564A1 (en) Identity verification method and device
CN112035819A (en) Fingerprint unlocking method and device, electronic equipment and computer readable storage medium
TWM556877U (en) Login verification device and login verification system
CN107895114A (en) A kind of management method of encrypted message, electronic equipment and readable storage medium storing program for executing
CN107995213B (en) Short message sending control method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18938324

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18938324

Country of ref document: EP

Kind code of ref document: A1