WO2020087527A1 - Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage - Google Patents
Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage Download PDFInfo
- Publication number
- WO2020087527A1 WO2020087527A1 PCT/CN2018/113803 CN2018113803W WO2020087527A1 WO 2020087527 A1 WO2020087527 A1 WO 2020087527A1 CN 2018113803 W CN2018113803 W CN 2018113803W WO 2020087527 A1 WO2020087527 A1 WO 2020087527A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- fingerprint information
- fingerprint
- authentication
- user operation
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Definitions
- This application relates to the technical field of fingerprint authentication, and in particular to a fingerprint authentication method, device, equipment and storage medium.
- the use of terminals such as mobile phones, tablet computers, etc.
- fingerprint recognition technology is widely used in the functions of unlocking, awakening and mobile payment of the terminal.
- the fingerprint payment function can not only overcome the disadvantage that the digital password is easily stolen in the prior art, but also input faster.
- identity authentication through fingerprint recognition usually involves touching or tapping on the fingerprint collection module with a finger to trigger the fingerprint authentication module to perform fingerprint authentication. If the fingerprint authentication module is successfully authenticated, the business behavior after the successful authentication is triggered.
- this application provides a fingerprint authentication method, device, equipment and storage medium.
- this application provides a fingerprint authentication method, including:
- the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's will due to misoperation Improve the security and reliability of the terminal.
- the first user operation is a user's pressing operation on the target key.
- the first user operation is the user's pressing operation on the target button
- the first user operation is simple and convenient, and through the first user operation, after the fingerprint authentication is successful, the user performs the pressing operation on the target button , It does not trigger the business behavior after the fingerprint information authentication is successful, which improves the operability of the terminal.
- the business behavior after the fingerprint information authentication is successful is triggered.
- the second user operation on the target button is acquired, and then the business behavior after the fingerprint information authentication is successful is triggered, and the second user operation is used to further determine that the fingerprint information authentication is successful.
- Business behavior improve the reliability of the terminal.
- the second user operation is an operation in which the user removes the finger from the target key.
- the second user operation is the operation of removing the finger from the target button
- the second user operation is simple and convenient, and through the second user operation, after the fingerprint authentication is successful, the user moves away from the target button Finger operation, and then trigger the business behavior after successful fingerprint information authentication, improve the operability and reliability of the terminal.
- the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is authenticated, including:
- the fingerprint authentication method provided in this embodiment of the present application further includes:
- the prompt information is pushed to remind the user that the business operation cannot be performed.
- the business behavior is user payment behavior.
- the target key is any of the Home key, Back key, or Confirm key.
- this application provides a fingerprint authentication device, including:
- the obtaining module is used to obtain the user's fingerprint information through the target button, and the authentication module is used to authenticate the obtained fingerprint information; the first processing module is used to authenticate the fingerprint information and obtain the first target button User operation does not trigger business behavior after fingerprint information authentication is successful.
- the first user operation is a user's pressing operation on the target key.
- the fingerprint authentication device provided in this application further includes:
- the second processing module is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and a second user operation on the target key is acquired.
- the second user operation is an operation in which the user removes the finger from the target key.
- the authentication module is specifically used for:
- the fingerprint authentication device provided by the embodiment of the present invention further includes:
- the pushing module is used to push the prompt information if the fingerprint information authentication is successful and the first user operation on the target button is obtained to remind the user that the business operation cannot be performed.
- the business behavior is user payment behavior.
- the target key is any of the Home key, Back key, or Confirm key.
- the present application provides a fingerprint identification module, including: a target button and a micro control unit MCU;
- the MCU is used to obtain the user fingerprint information through the target button, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor to When the processor determines that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
- the first user operation is a user's pressing operation on the target key.
- the MCU is also used for:
- the second user operation is obtained through the target button, the second user operation is sent to the processor, so that when the processor determines that the fingerprint information authentication is successful according to the authentication result, the business after the fingerprint information authentication succeeds is triggered according to the second user operation behavior.
- the second user operation is an operation in which the user removes the finger from the target key.
- the MCU is specifically used for:
- the MCU is also used for:
- the prompt information is pushed to remind the user that the business operation cannot be performed.
- the business behavior is user payment behavior.
- the target key is any of the Home key, Back key, or Confirm key.
- the present application provides a terminal device.
- the terminal device includes: a fingerprint identification module and a processor, and the fingerprint identification module includes: a target button and a micro control unit MCU;
- the MCU is used to: obtain the user fingerprint information through the target button, and authenticate the obtained fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor .
- the processor is used for: if it is determined that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
- the first user operation is a user's pressing operation on the target key.
- the MCU is also used to send the second user operation to the processor if the second user operation is acquired through the target button.
- the processor is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
- the second user operation is an operation in which the user removes the finger from the target key.
- the MCU is specifically used for:
- the MCU is also used for:
- the prompt information is pushed to remind the user that the business operation cannot be performed.
- the business behavior is user payment behavior.
- the target key is any of the Home key, Back key, or Confirm key.
- the present application provides a computer storage medium, the storage medium including computer instructions, which when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
- the present application provides a computer program product, including computer instructions, which, when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
- This application provides a fingerprint authentication method, device, equipment, and storage medium, including: obtaining user fingerprint information through a target button, and authenticating the obtained fingerprint information; if the fingerprint information is successfully authenticated, and the target button is obtained.
- the first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
- the fingerprint information authentication is successful, the first user operation is acquired, and the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's wishes due to misoperation, and further Improve the security and reliability of the terminal.
- FIG. 1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of this application.
- FIG. 2 is a schematic diagram of an operation interface provided by an embodiment of the present application.
- FIG. 3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application.
- FIG. 4 is a schematic diagram of an operation interface provided by another embodiment of the present application.
- FIG. 5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
- the embodiments of the present application provide a fingerprint authentication method, device, device and storage medium.
- the terminal displays a malicious virus webpage.
- the front-end program of the webpage is a payment page. At this time, it is waiting to verify the user's fingerprint.
- the payment page is disguised as other display forms, and the user cannot perceive that this page is a payment page, and the page does not provide an exit button.
- the habitual behavior of the user is to press the home button to exit the page, but when the user clicks the home button with the registered fingerprint finger, the fingerprint information authentication succeeds, which in turn triggers the payment behavior after the fingerprint authentication succeeds, causing unnecessary property loss .
- the terminal displays a malicious virus webpage.
- the front-end program of the webpage is a payment page, and there is no exit button. It is waiting to verify the user's fingerprint.
- the page is not disguised as other forms.
- the user quits the page by pressing the Home button in anxiety, but when the user clicks the Home button with a registered fingerprint finger, the fingerprint information verification is successful, which in turn triggers the payment behavior after successful fingerprint authentication, resulting in User unnecessary property loss.
- this application provides a fingerprint authentication method, device, equipment, and storage medium.
- FIG. 1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of the present application. As shown in FIG. 1, this embodiment is illustrated by applying the method to a terminal.
- the terminal may be a mobile phone, a digital broadcasting terminal, and a message receiving and sending device.
- Game consoles, tablet devices, medical devices, fitness equipment, personal digital assistants, etc. the method includes the following steps:
- Step S11 Obtain the user fingerprint information through the target button, and authenticate the acquired fingerprint information.
- Step S12 If the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is not triggered.
- the target button may be a physical button such as a Home button, a return button, and a confirmation button.
- the target button may also be a virtual button, such as a floating ball, etc.
- the target key is any of the Home key, Back key, or Confirm key.
- the user's fingerprint information is obtained through the user's related operation on the target button, where the user's related operation on the target button may be the user's touch operation on the target button, and the user feeds back the user's fingerprint information to the micro control unit in the terminal device through the related operation ,
- the terminal recognizes and authenticates the user's fingerprint information.
- Fingerprint recognition refers to the identification by comparing the detailed feature points of different fingerprints. Fingerprint recognition technology involves image processing, pattern recognition, computer vision, mathematical morphology, wavelet analysis and many other disciplines. Since each person's fingerprint is different, and there are obvious differences between the same person's ten fingers, the fingerprint can be used for identification. The embodiment of the present application does not limit the specific method of fingerprint identification, as long as it can identify the user's fingerprint information.
- obtaining the user fingerprint information through the target button and authenticating the obtained fingerprint information includes: obtaining a legal user fingerprint template; matching the user fingerprint information with the fingerprint template.
- the user Before performing fingerprint authentication, the user also needs to obtain a legal user fingerprint template.
- the legal user fingerprint template can be obtained by touching the user's fingerprint in the terminal to the target button that can collect the user fingerprint template. For example, the user can obtain , Use the right index finger to touch the target button multiple times, and register the preset fingerprint information of the user by repeatedly inputting the user fingerprint information, so as to obtain a legal user fingerprint template.
- the embodiment of the present application does not limit the specific method of acquiring the user fingerprint template. In addition, the embodiment of the present application also does not limit the fingers of the acquired user fingerprint template and the number of acquired user fingerprint templates, as long as the legal user fingerprint can be obtained Template.
- the obtained fingerprint information After obtaining the user's fingerprint information through the user's related operation on the target button, the obtained fingerprint information also needs to be authenticated. Specifically, the user's fingerprint information and the user's fingerprint template can be matched, because there are bumps on the front skin of the finger end The uneven texture contains a lot of information. The patterns of these skins are different in patterns, breakpoints, and intersections, and they are called "features" in information processing, and these features are unique and permanent, and can correspond one person to their fingerprints one by one. .
- By matching the user fingerprint information with the user fingerprint template and judging the authentication result based on the similarity between the user fingerprint information and the user fingerprint template if the user fingerprint information matches the user fingerprint template successfully, the user fingerprint information is successfully authenticated. If the fingerprint information and the user fingerprint template match fail, the user fingerprint information authentication fails.
- the embodiment of the present application does not make any limitation on the fingerprint information authentication method, as long as it can authenticate the acquired user fingerprint information.
- Authentication of user fingerprint information can be achieved through the central processing unit (CPU) of the terminal device, or through the microcontroller unit (MCU) of the terminal device.
- CPU central processing unit
- MCU microcontroller unit
- the authentication result of the user fingerprint information may be that the authentication of the user fingerprint information is successful or the authentication of the user fingerprint information fails. If the authentication of the user fingerprint information fails, the fingerprint will not be triggered For the business behavior after the authentication is successful, if you need to continue to execute the business behavior after the fingerprint authentication is successful, you need to re-acquire the user fingerprint information and authenticate the acquired fingerprint information.
- the embodiments of this application do not do anything about the terminal behavior after the authentication fails limit.
- the fingerprint information authentication is successful, the first user operation on the target button needs to be obtained. In the case where the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the successful fingerprint information authentication is not triggered. By further restricting the conditions that trigger the business behavior after the fingerprint information authentication is successful, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal.
- the front-end program of the webpage is a payment page
- the payment page is in the form of a normal payment page or disguised as other display forms, waiting for user fingerprint information authentication, if the user uses If the finger touches or clicks the home button, the fingerprint information authentication succeeds, and the user can also operate through the first user without triggering the payment behavior after the fingerprint information authentication succeeds, thereby avoiding unnecessary property loss of the user.
- acquiring the first user operation on the target key can be implemented by the MCU in the terminal device.
- FIG. 2 is a schematic diagram of an operation interface provided by an embodiment of the present application. As shown in FIG. 2, during the payment process, the user ’s fingerprint information needs to be obtained. , The interface 201 indicates that the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated.
- the user can perform the first user operation on the target button, where the interface 202 indicates the acquisition To the first user operation on the target button, the terminal pushes a prompt message 212 to remind the user that the current payment behavior has been blocked.
- the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
- the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
- the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
- the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
- the first user operation may be a touch operation on the target key exceeding a preset duration, or a long press operation on the target key, etc.
- the embodiment of the present application does not specifically limit the operation of the first user, as long as the fingerprint authentication is successful and The first user operation can be acquired without triggering the business behavior after the fingerprint information authentication routine.
- the first user operation is a pressing operation on the target key. After the fingerprint information authentication is successful, the user performs a pressing operation on the target key, and the business behavior after the fingerprint information authentication is successful is not triggered.
- a malicious virus webpage the front-end program of the webpage is a payment page
- the payment page is in the form of a normal payment page or disguised as other display forms, waiting for the user's fingerprint information to be authenticated, although the user uses the registered fingerprint finger Touching the home button results in successful fingerprint information authentication, but the user can also press the home button to prevent the terminal from triggering payment after the fingerprint information authentication is successful, thereby avoiding unnecessary property loss for the user.
- the first user operation may also be that the registered fingerprint finger touches the target key for more than a preset duration. For example, after the authentication of the obtained user fingerprint information is successful, the registered fingerprint finger touches the target button for more than a preset duration, and the business behavior after the successful fingerprint authentication is not triggered.
- the embodiment of the present application can obtain the first user operation after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is not triggered, and whether the fingerprint information is successfully authenticated is achieved. Trigger the corresponding business behavior for manual control, which effectively avoids business behavior that violates the user's wishes due to misoperation, etc., thereby improving the security and reliability of the terminal.
- FIG. 3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application.
- the method is applied to a terminal for illustration.
- the terminal may be a mobile phone or a digital broadcasting terminal.
- the fingerprint authentication method provided in this application also includes:
- Step S21 If the fingerprint information authentication is successful, and a second user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is triggered.
- a second user operation on the target key needs to be acquired.
- trigger The business behavior after the fingerprint information authentication succeeds, by further restricting the conditions that trigger the business behavior after the fingerprint information authentication succeeds, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal .
- Alipay's payment is successful and does not affect the triggering of the normal case Business behavior after successful fingerprint information authentication.
- FIG. 4 is a schematic diagram of an operation interface provided by another embodiment of the present application.
- the user for example, in the case where normal Alipay payment requires fingerprint authentication, the user ’s fingerprint information needs to be obtained and the fingerprint information is authenticated.
- Interface 401 shows The user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated.
- the user performs a second user operation on the terminal.
- the user interface 402 indicates that after the fingerprint information is successfully authenticated, the target The second user operation of the button triggers the payment behavior after the fingerprint information authentication is successful.
- the user may also be prompted to push the payment successfully through the push message 412.
- the second user operation may be a touch operation on the target key, or may be a pressing operation on the target key, etc.
- the embodiment of the present application does not specifically limit the operation of the second user, as long as the fingerprint authentication is successful and the second The user operation can trigger the business behavior after the fingerprint information authentication routine.
- the second user operation is an operation in which the user removes the finger from the target key. For example, in the case where normal Alipay payment requires fingerprint authentication, by acquiring the user's fingerprint information and authenticating the fingerprint information, and the user removes the finger from the target button, the Alipay payment is successful, which does not affect the fingerprint information authentication under normal circumstances Business behavior after success. Acquiring the second user operation on the target key can be implemented by the MCU in the terminal device.
- the embodiments of the present application do not specifically limit the operation of the first user and the operation of the second user, as long as the terminal can perform corresponding non-trigger or trigger business operations after successful fingerprint authentication according to the first user operation or the second user operation.
- the embodiment of the present application since the embodiment of the present application can obtain the operation of the second user after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is triggered, which effectively avoids the violation of the user due to misoperation and the like Willing business behavior, thereby improving the security and reliability of the terminal.
- FIG. 5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application.
- the method is applied to a terminal for illustration.
- the terminal may be a mobile phone or a digital broadcast.
- the fingerprint authentication device provided by the embodiment of the present application includes:
- the obtaining module 51 is used to obtain user fingerprint information through the target button, and the authentication module 52 is used to authenticate the obtained fingerprint information; the first processing module 53 is used to authenticate the fingerprint information and obtain the target button The first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
- the first user operation is a user's pressing operation on the target key.
- the fingerprint authentication device provided in this application further includes:
- the second processing module 54 is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and the second user operation is acquired.
- the second user operation is an operation in which the user removes the finger from the target key.
- the target key is any of the Home key, Back key, or Confirm key.
- the authentication module is specifically used for:
- the pushing module 55 is configured to, if the fingerprint information authentication is successful and the first user operation on the target button is obtained, push the prompt information to remind the user that the business operation cannot be performed.
- the business behavior is user payment behavior.
- the fingerprint authentication device provided by the embodiment of the present application may be used to execute the above-mentioned fingerprint authentication method.
- the content and effect refer to the method section.
- the embodiment of the present application does not limit this.
- FIG. 6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the application. As shown in FIG. 6, the fingerprint identification module provided by the application includes: a target button 61 and a micro control Unit MCU62.
- the MCU 62 is used to obtain the user fingerprint information through the target button 61, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button 61, the first user operation is sent to the processor , So that the processor does not trigger the business behavior after the fingerprint information authentication succeeds according to the first user operation when the processor determines that the fingerprint information authentication is successful according to the authentication result.
- the first user operation is a user's pressing operation on the target button 61.
- MCU62 is also used for:
- the second user operation is acquired through the target button 61, the second user operation is sent to the processor, so that when the processor determines that fingerprint information authentication is successful according to the authentication result, the fingerprint information authentication is triggered according to the second user operation Business behavior.
- the number of MCU62 can be one or more than two, for example, the number of MCU62 is one, then the MCU62 is used to obtain user fingerprint information and authenticate fingerprint information, and send the authentication result to the processor, and also use It is used to acquire the first user operation and send the first user operation to the processor, and also used to acquire the second user operation and send the second user operation to the processor.
- the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor
- the second MCU62 can be used to obtain user fingerprint information and Authenticate fingerprint information, send the authentication result to the processor, also used to obtain the first user operation, send the first user operation to the processor, also used to obtain the second user operation, and operate the second user Sent to the processor.
- the work that each MCU 62 is responsible for does not limit, as long as the technical solution of the present application can be realized.
- the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor, and the second MCU62 is used to obtain user fingerprint information and The fingerprint information is authenticated, and the authentication result is sent to the processor.
- the third MCU 62 is used to obtain the second user operation, and the second user operation is sent to the processor.
- the second user operation is an operation in which the user removes the finger from the target button 61.
- MCU62 is specifically used for:
- MCU62 is also used for:
- the prompt information is pushed to remind the user that the business operation cannot be performed.
- the business behavior is user payment behavior.
- the target button 61 is any one of the Home button, the Back button, or the Confirm button.
- the fingerprint identification module provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method, and the content and effect may refer to the method section, which is not limited by the embodiment of the present application.
- FIG. 7 is a schematic structural diagram of the terminal device according to an embodiment of the present application.
- the terminal device includes: a fingerprint identification module 71 and a processor 72, fingerprint identification Module 71 includes: target button 711 and micro control unit 712MCU712 for:
- the processor 72 is configured to: if the fingerprint information is successfully authenticated according to the authentication result, according to the first user operation, the business behavior after the successful fingerprint information authentication is not triggered.
- the first user operation is a user's pressing operation on the target button 711.
- MCU712 is also used for:
- the second user operation is acquired through the target button 711, the second user operation is sent to the processor 72;
- the processor 72 is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
- the second user operation is an operation in which the user removes the finger from the target button 711.
- MCU712 is specifically used for:
- MCU712 is also used for:
- the prompt information is pushed to remind the user that the business operation cannot be performed.
- the business behavior is user payment behavior.
- the target button 711 is any one of the Home button, the Back button, or the Confirm button.
- the terminal device provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method.
- the method section which is not limited by the embodiment of the present application.
- An embodiment of the present application further provides a computer storage medium.
- the storage medium includes computer instructions. When the instructions are executed by the computer, the computer is enabled to implement the fingerprint authentication method as described above.
- An embodiment of the present application further provides a computer program product, including: computer instructions, which when executed by the computer, cause the computer to implement the fingerprint authentication method as described above.
Abstract
La présente invention concerne un procédé et un appareil de vérification d'empreintes digitales, un dispositif, et un support de stockage Le procédé comprend les étapes consistant à : obtenir des informations d'empreinte digitale d'un utilisateur au moyen d'un bouton cible, et vérifier les informations d'empreinte digitale obtenues ; et, si la vérification des informations d'empreinte digitale est réussie et qu'une première opération d'utilisateur pour le bouton cible est obtenue, ne pas déclencher le comportement de service après la vérification réussie des informations d'empreinte digitale. L'invention permet d'améliorer la sécurité et la fiabilité d'un terminal.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/113803 WO2020087527A1 (fr) | 2018-11-02 | 2018-11-02 | Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage |
CN201880002045.9A CN109564604A (zh) | 2018-11-02 | 2018-11-02 | 指纹认证方法、装置、设备及存储介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/113803 WO2020087527A1 (fr) | 2018-11-02 | 2018-11-02 | Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020087527A1 true WO2020087527A1 (fr) | 2020-05-07 |
Family
ID=65872625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/113803 WO2020087527A1 (fr) | 2018-11-02 | 2018-11-02 | Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109564604A (fr) |
WO (1) | WO2020087527A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105117631A (zh) * | 2015-08-24 | 2015-12-02 | 联想(北京)有限公司 | 信息处理方法及电子设备 |
CN105210072A (zh) * | 2013-05-14 | 2015-12-30 | Lg电子株式会社 | 包括指纹扫描器的便携式装置及其控制方法 |
CN105989495A (zh) * | 2016-03-07 | 2016-10-05 | 李明 | 一种支付方法及系统 |
CN106062701A (zh) * | 2016-04-12 | 2016-10-26 | 深圳信炜科技有限公司 | 电子设备 |
US20160335469A1 (en) * | 2014-04-10 | 2016-11-17 | Kuo-Ching Chiang | Portable Device with Security Module |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8060413B2 (en) * | 2008-03-14 | 2011-11-15 | Research In Motion Limited | System and method for making electronic payments from a wireless mobile device |
CN107066197A (zh) * | 2017-03-08 | 2017-08-18 | 广东欧珀移动通信有限公司 | 终端设备的控制方法及终端设备 |
CN107133799A (zh) * | 2017-04-28 | 2017-09-05 | 上海与德科技有限公司 | 一种基于生物特征的支付方法及装置 |
CN108156310A (zh) * | 2017-11-27 | 2018-06-12 | 深圳市金立通信设备有限公司 | 一种指纹处理的方法和系统、终端设备及计算机可读介质 |
-
2018
- 2018-11-02 CN CN201880002045.9A patent/CN109564604A/zh active Pending
- 2018-11-02 WO PCT/CN2018/113803 patent/WO2020087527A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105210072A (zh) * | 2013-05-14 | 2015-12-30 | Lg电子株式会社 | 包括指纹扫描器的便携式装置及其控制方法 |
US20160335469A1 (en) * | 2014-04-10 | 2016-11-17 | Kuo-Ching Chiang | Portable Device with Security Module |
CN105117631A (zh) * | 2015-08-24 | 2015-12-02 | 联想(北京)有限公司 | 信息处理方法及电子设备 |
CN105989495A (zh) * | 2016-03-07 | 2016-10-05 | 李明 | 一种支付方法及系统 |
CN106062701A (zh) * | 2016-04-12 | 2016-10-26 | 深圳信炜科技有限公司 | 电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN109564604A (zh) | 2019-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10482230B2 (en) | Face-controlled liveness verification | |
KR102387568B1 (ko) | 지문 인식 기반 인증 방법 및 장치 | |
JP2017530457A (ja) | アイデンティティ認証方法ならびに装置、端末及びサーバ | |
US10644887B2 (en) | Identity validity verification method, apparatus and system | |
CN105825382A (zh) | 一种移动支付方法及电子设备 | |
CN105160227A (zh) | 远程指纹验证方法和用户终端及指纹验证系统 | |
US20190130411A1 (en) | Method and system for data processing | |
CN109145558B (zh) | 解锁控制方法及电子装置 | |
CN105678147B (zh) | 触控操作的方法和装置 | |
CN107533598B (zh) | 应用程序的登录密码的输入方法、装置和终端 | |
WO2021244531A1 (fr) | Procédé et appareil de paiement basés sur la reconnaissance faciale | |
CN104951677B (zh) | 一种信息处理方法和装置 | |
JP6399605B2 (ja) | 認証装置、認証方法及びプログラム | |
CN110990811A (zh) | 一种身份认证方法及装置 | |
CN108133129A (zh) | 一种应用程序的解锁方法、装置及移动终端 | |
WO2016062200A1 (fr) | Procédé et appareil d'authentification d'empreintes digitales et serveur | |
CN104063651B (zh) | 鉴权及提交装置和鉴权及提交方法 | |
CN105653993A (zh) | 一种密码输入方法、装置及电子设备 | |
CN107786349B (zh) | 一种针对用户账号的安全管理方法及装置 | |
CN109543431B (zh) | 应用加密方法、装置、电子设备及存储介质 | |
WO2020087527A1 (fr) | Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage | |
WO2016095564A1 (fr) | Procédé et dispositif de vérification d'identité | |
CN112035819A (zh) | 指纹解锁方法、装置、电子设备及计算机可读存储介质 | |
TWM556877U (zh) | 登入驗證裝置及登入驗證系統 | |
CN107895114A (zh) | 一种密码信息的管理方法、电子设备以及可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18938324 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18938324 Country of ref document: EP Kind code of ref document: A1 |