WO2020087527A1 - Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage - Google Patents

Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage Download PDF

Info

Publication number
WO2020087527A1
WO2020087527A1 PCT/CN2018/113803 CN2018113803W WO2020087527A1 WO 2020087527 A1 WO2020087527 A1 WO 2020087527A1 CN 2018113803 W CN2018113803 W CN 2018113803W WO 2020087527 A1 WO2020087527 A1 WO 2020087527A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
fingerprint information
fingerprint
authentication
user operation
Prior art date
Application number
PCT/CN2018/113803
Other languages
English (en)
Chinese (zh)
Inventor
曹岚健
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to PCT/CN2018/113803 priority Critical patent/WO2020087527A1/fr
Priority to CN201880002045.9A priority patent/CN109564604A/zh
Publication of WO2020087527A1 publication Critical patent/WO2020087527A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Definitions

  • This application relates to the technical field of fingerprint authentication, and in particular to a fingerprint authentication method, device, equipment and storage medium.
  • the use of terminals such as mobile phones, tablet computers, etc.
  • fingerprint recognition technology is widely used in the functions of unlocking, awakening and mobile payment of the terminal.
  • the fingerprint payment function can not only overcome the disadvantage that the digital password is easily stolen in the prior art, but also input faster.
  • identity authentication through fingerprint recognition usually involves touching or tapping on the fingerprint collection module with a finger to trigger the fingerprint authentication module to perform fingerprint authentication. If the fingerprint authentication module is successfully authenticated, the business behavior after the successful authentication is triggered.
  • this application provides a fingerprint authentication method, device, equipment and storage medium.
  • this application provides a fingerprint authentication method, including:
  • the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's will due to misoperation Improve the security and reliability of the terminal.
  • the first user operation is a user's pressing operation on the target key.
  • the first user operation is the user's pressing operation on the target button
  • the first user operation is simple and convenient, and through the first user operation, after the fingerprint authentication is successful, the user performs the pressing operation on the target button , It does not trigger the business behavior after the fingerprint information authentication is successful, which improves the operability of the terminal.
  • the business behavior after the fingerprint information authentication is successful is triggered.
  • the second user operation on the target button is acquired, and then the business behavior after the fingerprint information authentication is successful is triggered, and the second user operation is used to further determine that the fingerprint information authentication is successful.
  • Business behavior improve the reliability of the terminal.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the second user operation is the operation of removing the finger from the target button
  • the second user operation is simple and convenient, and through the second user operation, after the fingerprint authentication is successful, the user moves away from the target button Finger operation, and then trigger the business behavior after successful fingerprint information authentication, improve the operability and reliability of the terminal.
  • the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is authenticated, including:
  • the fingerprint authentication method provided in this embodiment of the present application further includes:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • this application provides a fingerprint authentication device, including:
  • the obtaining module is used to obtain the user's fingerprint information through the target button, and the authentication module is used to authenticate the obtained fingerprint information; the first processing module is used to authenticate the fingerprint information and obtain the first target button User operation does not trigger business behavior after fingerprint information authentication is successful.
  • the first user operation is a user's pressing operation on the target key.
  • the fingerprint authentication device provided in this application further includes:
  • the second processing module is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and a second user operation on the target key is acquired.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the authentication module is specifically used for:
  • the fingerprint authentication device provided by the embodiment of the present invention further includes:
  • the pushing module is used to push the prompt information if the fingerprint information authentication is successful and the first user operation on the target button is obtained to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the present application provides a fingerprint identification module, including: a target button and a micro control unit MCU;
  • the MCU is used to obtain the user fingerprint information through the target button, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor to When the processor determines that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
  • the first user operation is a user's pressing operation on the target key.
  • the MCU is also used for:
  • the second user operation is obtained through the target button, the second user operation is sent to the processor, so that when the processor determines that the fingerprint information authentication is successful according to the authentication result, the business after the fingerprint information authentication succeeds is triggered according to the second user operation behavior.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the MCU is specifically used for:
  • the MCU is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the present application provides a terminal device.
  • the terminal device includes: a fingerprint identification module and a processor, and the fingerprint identification module includes: a target button and a micro control unit MCU;
  • the MCU is used to: obtain the user fingerprint information through the target button, and authenticate the obtained fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button, the first user operation is sent to the processor .
  • the processor is used for: if it is determined that the fingerprint information authentication is successful according to the authentication result, the business behavior after the fingerprint information authentication succeeds is not triggered according to the first user operation.
  • the first user operation is a user's pressing operation on the target key.
  • the MCU is also used to send the second user operation to the processor if the second user operation is acquired through the target button.
  • the processor is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the MCU is specifically used for:
  • the MCU is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the present application provides a computer storage medium, the storage medium including computer instructions, which when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
  • the present application provides a computer program product, including computer instructions, which, when executed by a computer, causes the computer to implement the fingerprint authentication method of the first aspect or the optional manner of the first aspect.
  • This application provides a fingerprint authentication method, device, equipment, and storage medium, including: obtaining user fingerprint information through a target button, and authenticating the obtained fingerprint information; if the fingerprint information is successfully authenticated, and the target button is obtained.
  • the first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
  • the fingerprint information authentication is successful, the first user operation is acquired, and the business behavior after the fingerprint information authentication is successful is not triggered, which effectively avoids the business behavior that violates the user's wishes due to misoperation, and further Improve the security and reliability of the terminal.
  • FIG. 1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of this application.
  • FIG. 2 is a schematic diagram of an operation interface provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application.
  • FIG. 4 is a schematic diagram of an operation interface provided by another embodiment of the present application.
  • FIG. 5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
  • the embodiments of the present application provide a fingerprint authentication method, device, device and storage medium.
  • the terminal displays a malicious virus webpage.
  • the front-end program of the webpage is a payment page. At this time, it is waiting to verify the user's fingerprint.
  • the payment page is disguised as other display forms, and the user cannot perceive that this page is a payment page, and the page does not provide an exit button.
  • the habitual behavior of the user is to press the home button to exit the page, but when the user clicks the home button with the registered fingerprint finger, the fingerprint information authentication succeeds, which in turn triggers the payment behavior after the fingerprint authentication succeeds, causing unnecessary property loss .
  • the terminal displays a malicious virus webpage.
  • the front-end program of the webpage is a payment page, and there is no exit button. It is waiting to verify the user's fingerprint.
  • the page is not disguised as other forms.
  • the user quits the page by pressing the Home button in anxiety, but when the user clicks the Home button with a registered fingerprint finger, the fingerprint information verification is successful, which in turn triggers the payment behavior after successful fingerprint authentication, resulting in User unnecessary property loss.
  • this application provides a fingerprint authentication method, device, equipment, and storage medium.
  • FIG. 1 is a schematic flowchart of a fingerprint authentication method provided by an embodiment of the present application. As shown in FIG. 1, this embodiment is illustrated by applying the method to a terminal.
  • the terminal may be a mobile phone, a digital broadcasting terminal, and a message receiving and sending device.
  • Game consoles, tablet devices, medical devices, fitness equipment, personal digital assistants, etc. the method includes the following steps:
  • Step S11 Obtain the user fingerprint information through the target button, and authenticate the acquired fingerprint information.
  • Step S12 If the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is not triggered.
  • the target button may be a physical button such as a Home button, a return button, and a confirmation button.
  • the target button may also be a virtual button, such as a floating ball, etc.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the user's fingerprint information is obtained through the user's related operation on the target button, where the user's related operation on the target button may be the user's touch operation on the target button, and the user feeds back the user's fingerprint information to the micro control unit in the terminal device through the related operation ,
  • the terminal recognizes and authenticates the user's fingerprint information.
  • Fingerprint recognition refers to the identification by comparing the detailed feature points of different fingerprints. Fingerprint recognition technology involves image processing, pattern recognition, computer vision, mathematical morphology, wavelet analysis and many other disciplines. Since each person's fingerprint is different, and there are obvious differences between the same person's ten fingers, the fingerprint can be used for identification. The embodiment of the present application does not limit the specific method of fingerprint identification, as long as it can identify the user's fingerprint information.
  • obtaining the user fingerprint information through the target button and authenticating the obtained fingerprint information includes: obtaining a legal user fingerprint template; matching the user fingerprint information with the fingerprint template.
  • the user Before performing fingerprint authentication, the user also needs to obtain a legal user fingerprint template.
  • the legal user fingerprint template can be obtained by touching the user's fingerprint in the terminal to the target button that can collect the user fingerprint template. For example, the user can obtain , Use the right index finger to touch the target button multiple times, and register the preset fingerprint information of the user by repeatedly inputting the user fingerprint information, so as to obtain a legal user fingerprint template.
  • the embodiment of the present application does not limit the specific method of acquiring the user fingerprint template. In addition, the embodiment of the present application also does not limit the fingers of the acquired user fingerprint template and the number of acquired user fingerprint templates, as long as the legal user fingerprint can be obtained Template.
  • the obtained fingerprint information After obtaining the user's fingerprint information through the user's related operation on the target button, the obtained fingerprint information also needs to be authenticated. Specifically, the user's fingerprint information and the user's fingerprint template can be matched, because there are bumps on the front skin of the finger end The uneven texture contains a lot of information. The patterns of these skins are different in patterns, breakpoints, and intersections, and they are called "features" in information processing, and these features are unique and permanent, and can correspond one person to their fingerprints one by one. .
  • By matching the user fingerprint information with the user fingerprint template and judging the authentication result based on the similarity between the user fingerprint information and the user fingerprint template if the user fingerprint information matches the user fingerprint template successfully, the user fingerprint information is successfully authenticated. If the fingerprint information and the user fingerprint template match fail, the user fingerprint information authentication fails.
  • the embodiment of the present application does not make any limitation on the fingerprint information authentication method, as long as it can authenticate the acquired user fingerprint information.
  • Authentication of user fingerprint information can be achieved through the central processing unit (CPU) of the terminal device, or through the microcontroller unit (MCU) of the terminal device.
  • CPU central processing unit
  • MCU microcontroller unit
  • the authentication result of the user fingerprint information may be that the authentication of the user fingerprint information is successful or the authentication of the user fingerprint information fails. If the authentication of the user fingerprint information fails, the fingerprint will not be triggered For the business behavior after the authentication is successful, if you need to continue to execute the business behavior after the fingerprint authentication is successful, you need to re-acquire the user fingerprint information and authenticate the acquired fingerprint information.
  • the embodiments of this application do not do anything about the terminal behavior after the authentication fails limit.
  • the fingerprint information authentication is successful, the first user operation on the target button needs to be obtained. In the case where the fingerprint information authentication is successful and the first user operation on the target button is obtained, the business behavior after the successful fingerprint information authentication is not triggered. By further restricting the conditions that trigger the business behavior after the fingerprint information authentication is successful, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal.
  • the front-end program of the webpage is a payment page
  • the payment page is in the form of a normal payment page or disguised as other display forms, waiting for user fingerprint information authentication, if the user uses If the finger touches or clicks the home button, the fingerprint information authentication succeeds, and the user can also operate through the first user without triggering the payment behavior after the fingerprint information authentication succeeds, thereby avoiding unnecessary property loss of the user.
  • acquiring the first user operation on the target key can be implemented by the MCU in the terminal device.
  • FIG. 2 is a schematic diagram of an operation interface provided by an embodiment of the present application. As shown in FIG. 2, during the payment process, the user ’s fingerprint information needs to be obtained. , The interface 201 indicates that the user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated.
  • the user can perform the first user operation on the target button, where the interface 202 indicates the acquisition To the first user operation on the target button, the terminal pushes a prompt message 212 to remind the user that the current payment behavior has been blocked.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the fingerprint information authentication is successful, but the first user operation is not obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • the first user operation may be a touch operation on the target key exceeding a preset duration, or a long press operation on the target key, etc.
  • the embodiment of the present application does not specifically limit the operation of the first user, as long as the fingerprint authentication is successful and The first user operation can be acquired without triggering the business behavior after the fingerprint information authentication routine.
  • the first user operation is a pressing operation on the target key. After the fingerprint information authentication is successful, the user performs a pressing operation on the target key, and the business behavior after the fingerprint information authentication is successful is not triggered.
  • a malicious virus webpage the front-end program of the webpage is a payment page
  • the payment page is in the form of a normal payment page or disguised as other display forms, waiting for the user's fingerprint information to be authenticated, although the user uses the registered fingerprint finger Touching the home button results in successful fingerprint information authentication, but the user can also press the home button to prevent the terminal from triggering payment after the fingerprint information authentication is successful, thereby avoiding unnecessary property loss for the user.
  • the first user operation may also be that the registered fingerprint finger touches the target key for more than a preset duration. For example, after the authentication of the obtained user fingerprint information is successful, the registered fingerprint finger touches the target button for more than a preset duration, and the business behavior after the successful fingerprint authentication is not triggered.
  • the embodiment of the present application can obtain the first user operation after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is not triggered, and whether the fingerprint information is successfully authenticated is achieved. Trigger the corresponding business behavior for manual control, which effectively avoids business behavior that violates the user's wishes due to misoperation, etc., thereby improving the security and reliability of the terminal.
  • FIG. 3 is a schematic flowchart of a fingerprint authentication method provided by another embodiment of the present application.
  • the method is applied to a terminal for illustration.
  • the terminal may be a mobile phone or a digital broadcasting terminal.
  • the fingerprint authentication method provided in this application also includes:
  • Step S21 If the fingerprint information authentication is successful, and a second user operation on the target button is obtained, the business behavior after the fingerprint information authentication is successful is triggered.
  • a second user operation on the target key needs to be acquired.
  • trigger The business behavior after the fingerprint information authentication succeeds, by further restricting the conditions that trigger the business behavior after the fingerprint information authentication succeeds, it can effectively avoid subsequent business behaviors caused by user misoperation, etc., and improve the operability and security of the terminal .
  • Alipay's payment is successful and does not affect the triggering of the normal case Business behavior after successful fingerprint information authentication.
  • FIG. 4 is a schematic diagram of an operation interface provided by another embodiment of the present application.
  • the user for example, in the case where normal Alipay payment requires fingerprint authentication, the user ’s fingerprint information needs to be obtained and the fingerprint information is authenticated.
  • Interface 401 shows The user's fingerprint information is obtained through the target button, and the obtained fingerprint information is successfully authenticated.
  • the user performs a second user operation on the terminal.
  • the user interface 402 indicates that after the fingerprint information is successfully authenticated, the target The second user operation of the button triggers the payment behavior after the fingerprint information authentication is successful.
  • the user may also be prompted to push the payment successfully through the push message 412.
  • the second user operation may be a touch operation on the target key, or may be a pressing operation on the target key, etc.
  • the embodiment of the present application does not specifically limit the operation of the second user, as long as the fingerprint authentication is successful and the second The user operation can trigger the business behavior after the fingerprint information authentication routine.
  • the second user operation is an operation in which the user removes the finger from the target key. For example, in the case where normal Alipay payment requires fingerprint authentication, by acquiring the user's fingerprint information and authenticating the fingerprint information, and the user removes the finger from the target button, the Alipay payment is successful, which does not affect the fingerprint information authentication under normal circumstances Business behavior after success. Acquiring the second user operation on the target key can be implemented by the MCU in the terminal device.
  • the embodiments of the present application do not specifically limit the operation of the first user and the operation of the second user, as long as the terminal can perform corresponding non-trigger or trigger business operations after successful fingerprint authentication according to the first user operation or the second user operation.
  • the embodiment of the present application since the embodiment of the present application can obtain the operation of the second user after the fingerprint information authentication is successful, the business behavior after the fingerprint information authentication is successful is triggered, which effectively avoids the violation of the user due to misoperation and the like Willing business behavior, thereby improving the security and reliability of the terminal.
  • FIG. 5 is a schematic diagram of a fingerprint authentication device provided by an embodiment of the present application.
  • the method is applied to a terminal for illustration.
  • the terminal may be a mobile phone or a digital broadcast.
  • the fingerprint authentication device provided by the embodiment of the present application includes:
  • the obtaining module 51 is used to obtain user fingerprint information through the target button, and the authentication module 52 is used to authenticate the obtained fingerprint information; the first processing module 53 is used to authenticate the fingerprint information and obtain the target button The first user operation does not trigger the business behavior after the fingerprint information authentication is successful.
  • the first user operation is a user's pressing operation on the target key.
  • the fingerprint authentication device provided in this application further includes:
  • the second processing module 54 is configured to trigger the business behavior after the fingerprint information authentication is successful if the fingerprint information authentication is successful and the second user operation is acquired.
  • the second user operation is an operation in which the user removes the finger from the target key.
  • the target key is any of the Home key, Back key, or Confirm key.
  • the authentication module is specifically used for:
  • the pushing module 55 is configured to, if the fingerprint information authentication is successful and the first user operation on the target button is obtained, push the prompt information to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the fingerprint authentication device provided by the embodiment of the present application may be used to execute the above-mentioned fingerprint authentication method.
  • the content and effect refer to the method section.
  • the embodiment of the present application does not limit this.
  • FIG. 6 is a schematic structural diagram of a fingerprint identification module provided by an embodiment of the application. As shown in FIG. 6, the fingerprint identification module provided by the application includes: a target button 61 and a micro control Unit MCU62.
  • the MCU 62 is used to obtain the user fingerprint information through the target button 61, authenticate the fingerprint information, and send the authentication result to the processor; if the first user operation is obtained through the target button 61, the first user operation is sent to the processor , So that the processor does not trigger the business behavior after the fingerprint information authentication succeeds according to the first user operation when the processor determines that the fingerprint information authentication is successful according to the authentication result.
  • the first user operation is a user's pressing operation on the target button 61.
  • MCU62 is also used for:
  • the second user operation is acquired through the target button 61, the second user operation is sent to the processor, so that when the processor determines that fingerprint information authentication is successful according to the authentication result, the fingerprint information authentication is triggered according to the second user operation Business behavior.
  • the number of MCU62 can be one or more than two, for example, the number of MCU62 is one, then the MCU62 is used to obtain user fingerprint information and authenticate fingerprint information, and send the authentication result to the processor, and also use It is used to acquire the first user operation and send the first user operation to the processor, and also used to acquire the second user operation and send the second user operation to the processor.
  • the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor
  • the second MCU62 can be used to obtain user fingerprint information and Authenticate fingerprint information, send the authentication result to the processor, also used to obtain the first user operation, send the first user operation to the processor, also used to obtain the second user operation, and operate the second user Sent to the processor.
  • the work that each MCU 62 is responsible for does not limit, as long as the technical solution of the present application can be realized.
  • the first MCU62 can be used to obtain user fingerprint information and authenticate the fingerprint information, and send the authentication result to the processor, and the second MCU62 is used to obtain user fingerprint information and The fingerprint information is authenticated, and the authentication result is sent to the processor.
  • the third MCU 62 is used to obtain the second user operation, and the second user operation is sent to the processor.
  • the second user operation is an operation in which the user removes the finger from the target button 61.
  • MCU62 is specifically used for:
  • MCU62 is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target button 61 is any one of the Home button, the Back button, or the Confirm button.
  • the fingerprint identification module provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method, and the content and effect may refer to the method section, which is not limited by the embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of the terminal device according to an embodiment of the present application.
  • the terminal device includes: a fingerprint identification module 71 and a processor 72, fingerprint identification Module 71 includes: target button 711 and micro control unit 712MCU712 for:
  • the processor 72 is configured to: if the fingerprint information is successfully authenticated according to the authentication result, according to the first user operation, the business behavior after the successful fingerprint information authentication is not triggered.
  • the first user operation is a user's pressing operation on the target button 711.
  • MCU712 is also used for:
  • the second user operation is acquired through the target button 711, the second user operation is sent to the processor 72;
  • the processor 72 is further configured to trigger the business behavior after the fingerprint information authentication succeeds according to the operation of the second user if it is determined that the fingerprint information authentication is successful according to the authentication result.
  • the second user operation is an operation in which the user removes the finger from the target button 711.
  • MCU712 is specifically used for:
  • MCU712 is also used for:
  • the prompt information is pushed to remind the user that the business operation cannot be performed.
  • the business behavior is user payment behavior.
  • the target button 711 is any one of the Home button, the Back button, or the Confirm button.
  • the terminal device provided by the embodiment of the present application may be used to perform the above-mentioned fingerprint authentication method.
  • the method section which is not limited by the embodiment of the present application.
  • An embodiment of the present application further provides a computer storage medium.
  • the storage medium includes computer instructions. When the instructions are executed by the computer, the computer is enabled to implement the fingerprint authentication method as described above.
  • An embodiment of the present application further provides a computer program product, including: computer instructions, which when executed by the computer, cause the computer to implement the fingerprint authentication method as described above.

Abstract

La présente invention concerne un procédé et un appareil de vérification d'empreintes digitales, un dispositif, et un support de stockage Le procédé comprend les étapes consistant à : obtenir des informations d'empreinte digitale d'un utilisateur au moyen d'un bouton cible, et vérifier les informations d'empreinte digitale obtenues ; et, si la vérification des informations d'empreinte digitale est réussie et qu'une première opération d'utilisateur pour le bouton cible est obtenue, ne pas déclencher le comportement de service après la vérification réussie des informations d'empreinte digitale. L'invention permet d'améliorer la sécurité et la fiabilité d'un terminal.
PCT/CN2018/113803 2018-11-02 2018-11-02 Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage WO2020087527A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/113803 WO2020087527A1 (fr) 2018-11-02 2018-11-02 Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage
CN201880002045.9A CN109564604A (zh) 2018-11-02 2018-11-02 指纹认证方法、装置、设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/113803 WO2020087527A1 (fr) 2018-11-02 2018-11-02 Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage

Publications (1)

Publication Number Publication Date
WO2020087527A1 true WO2020087527A1 (fr) 2020-05-07

Family

ID=65872625

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/113803 WO2020087527A1 (fr) 2018-11-02 2018-11-02 Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage

Country Status (2)

Country Link
CN (1) CN109564604A (fr)
WO (1) WO2020087527A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117631A (zh) * 2015-08-24 2015-12-02 联想(北京)有限公司 信息处理方法及电子设备
CN105210072A (zh) * 2013-05-14 2015-12-30 Lg电子株式会社 包括指纹扫描器的便携式装置及其控制方法
CN105989495A (zh) * 2016-03-07 2016-10-05 李明 一种支付方法及系统
CN106062701A (zh) * 2016-04-12 2016-10-26 深圳信炜科技有限公司 电子设备
US20160335469A1 (en) * 2014-04-10 2016-11-17 Kuo-Ching Chiang Portable Device with Security Module

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8060413B2 (en) * 2008-03-14 2011-11-15 Research In Motion Limited System and method for making electronic payments from a wireless mobile device
CN107066197A (zh) * 2017-03-08 2017-08-18 广东欧珀移动通信有限公司 终端设备的控制方法及终端设备
CN107133799A (zh) * 2017-04-28 2017-09-05 上海与德科技有限公司 一种基于生物特征的支付方法及装置
CN108156310A (zh) * 2017-11-27 2018-06-12 深圳市金立通信设备有限公司 一种指纹处理的方法和系统、终端设备及计算机可读介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105210072A (zh) * 2013-05-14 2015-12-30 Lg电子株式会社 包括指纹扫描器的便携式装置及其控制方法
US20160335469A1 (en) * 2014-04-10 2016-11-17 Kuo-Ching Chiang Portable Device with Security Module
CN105117631A (zh) * 2015-08-24 2015-12-02 联想(北京)有限公司 信息处理方法及电子设备
CN105989495A (zh) * 2016-03-07 2016-10-05 李明 一种支付方法及系统
CN106062701A (zh) * 2016-04-12 2016-10-26 深圳信炜科技有限公司 电子设备

Also Published As

Publication number Publication date
CN109564604A (zh) 2019-04-02

Similar Documents

Publication Publication Date Title
US10482230B2 (en) Face-controlled liveness verification
KR102387568B1 (ko) 지문 인식 기반 인증 방법 및 장치
JP2017530457A (ja) アイデンティティ認証方法ならびに装置、端末及びサーバ
US10644887B2 (en) Identity validity verification method, apparatus and system
CN105825382A (zh) 一种移动支付方法及电子设备
CN105160227A (zh) 远程指纹验证方法和用户终端及指纹验证系统
US20190130411A1 (en) Method and system for data processing
CN109145558B (zh) 解锁控制方法及电子装置
CN105678147B (zh) 触控操作的方法和装置
CN107533598B (zh) 应用程序的登录密码的输入方法、装置和终端
WO2021244531A1 (fr) Procédé et appareil de paiement basés sur la reconnaissance faciale
CN104951677B (zh) 一种信息处理方法和装置
JP6399605B2 (ja) 認証装置、認証方法及びプログラム
CN110990811A (zh) 一种身份认证方法及装置
CN108133129A (zh) 一种应用程序的解锁方法、装置及移动终端
WO2016062200A1 (fr) Procédé et appareil d'authentification d'empreintes digitales et serveur
CN104063651B (zh) 鉴权及提交装置和鉴权及提交方法
CN105653993A (zh) 一种密码输入方法、装置及电子设备
CN107786349B (zh) 一种针对用户账号的安全管理方法及装置
CN109543431B (zh) 应用加密方法、装置、电子设备及存储介质
WO2020087527A1 (fr) Procédé et appareil de vérification d'empreintes digitales, dispositif et support de stockage
WO2016095564A1 (fr) Procédé et dispositif de vérification d'identité
CN112035819A (zh) 指纹解锁方法、装置、电子设备及计算机可读存储介质
TWM556877U (zh) 登入驗證裝置及登入驗證系統
CN107895114A (zh) 一种密码信息的管理方法、电子设备以及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18938324

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18938324

Country of ref document: EP

Kind code of ref document: A1