WO2020103291A1 - Procédé, appareil et dispositif de déverrouillage sur la base de la trajectoire du mouvement des yeux, et support de stockage - Google Patents

Procédé, appareil et dispositif de déverrouillage sur la base de la trajectoire du mouvement des yeux, et support de stockage

Info

Publication number
WO2020103291A1
WO2020103291A1 PCT/CN2018/124582 CN2018124582W WO2020103291A1 WO 2020103291 A1 WO2020103291 A1 WO 2020103291A1 CN 2018124582 W CN2018124582 W CN 2018124582W WO 2020103291 A1 WO2020103291 A1 WO 2020103291A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
password
visible light
infrared
signal
Prior art date
Application number
PCT/CN2018/124582
Other languages
English (en)
Chinese (zh)
Inventor
刘伟杰
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020103291A1 publication Critical patent/WO2020103291A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer

Definitions

  • the present application relates to the technical field of information security, and in particular to an unlocking method, device, device and storage medium based on eye movement trajectories.
  • the password protection of the smart terminal is to use the smart terminal owner to input different forms of security passwords in the process of using the smart terminal to obtain the safe use of the smart terminal.
  • the user needs to input the correct password when using it in order to use the smart terminal normally.
  • the types of security passwords include digital passwords, nine-grid passwords, voiceprint passwords, fingerprint passwords.
  • An unlocking method based on eye movement trajectory includes:
  • the ambient light intensity select infrared or visible light to irradiate the user's eyeball according to the ambient light intensity; obtain the user's eyeball to reflect the infrared light or the visible light to form a reflected light signal, and track the reflection
  • the walking track of the optical signal establishing the correspondence between the walking track and the position of the display screen;
  • An unlocking device based on eye movement trajectory includes the following modules:
  • the optical signal transmitting module is set to obtain the ambient light intensity, and select infrared or visible light to irradiate the eyes of the user according to the ambient light intensity;
  • the optical signal tracking module is configured to acquire the infrared light or the visible light reflected by the user's eyeballs to form a reflected light signal, track the walking path of the reflected light signal, and establish a correspondence between the walking path and the position of the display screen relationship;
  • the data processing module is configured to obtain the strong reflection point formed on the display screen by the reflected light signal according to the corresponding relationship, and compare the strong reflection point with the unlock password, and if the verification result is consistent, proceed If the unlocking operation is inconsistent, re-emit infrared rays or visible light to re-enter the password in the eyes of the user, and the unlocking password is pre-stored in the database.
  • a computer device includes a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor causes the processor to perform the above-mentioned unlocking method based on eye movement trajectory A step of.
  • a storage medium storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, causes the one or more processors to perform the steps of the above-described unlocking method based on eye movement trajectories.
  • the above method, device, computer equipment and storage medium for unlocking based on eye movement trajectory include obtaining ambient light intensity, selecting infrared or visible light to irradiate the user's eyeball according to the ambient light intensity; obtaining the user's eyeball alignment After the infrared rays or the visible light is reflected, a reflected light signal is formed, the walking track of the reflected light signal is tracked, and the corresponding relationship between the walking track and the position of the display screen is established; according to the corresponding relationship, the reflected light signal is acquired in The strong reflection point formed on the display screen compares the strong reflection point with the unlock code, if the verification result is consistent, the unlock operation is performed, and if it is inconsistent, re-emission of infrared rays or visible light is re-entered in the user's eyeball Password, the unlock password is pre-stored in the database.
  • This technical solution aims at unlocking based on eye movement trajectories when an intelligent terminal is unlocked and protected, so as to realize accurate judgment of the user's identity, and prevent non-intelligent terminal owners from using security unlocking vulnerabilities to threaten the owner's personal information and property.
  • FIG. 1 is an overall flowchart of an unlocking method based on eye movement trajectories of this application;
  • FIG. 2 is a schematic diagram of a process of establishing a mapping relationship in an unlocking method based on eye movement trajectories of the present application
  • FIG. 3 is a structural diagram of unlocking based on eye movement trajectories of the present application.
  • FIG. 1 is a flowchart of an unlocking method based on eye movement trajectory in an embodiment of the present application. As shown in FIG. 1, an unlocking method based on eye movement trajectory includes:
  • the optical signal is normally distributed to establish a histogram, the strongest electrical signal is output according to the position of the maximum value, and is established according to the strongest electrical signal and the physical position of the display screen Mapping relations.
  • infrared or visible light is used as the emitted light during eye tracking according to different environments, and the infrared or visible light is absorbed and converted into an electrical signal using a photosensitive panel, and then analyzed by the processor and compared with the password in the database to achieve To control the eye tracking process accurately.
  • the above-mentioned eye tracking method can apply the method of eye movement in various environments to unlock the smart terminal, which effectively improves the accuracy of unlocking the eye movement method.
  • the ambient light intensity is greater than the light intensity threshold, infrared light is used to emit an optical signal to the user's eyeball; the ambient light intensity is less than When the light intensity threshold is used, visible light is used to emit an optical signal to the user's eyeball, and the light intensity threshold is obtained from historical data;
  • a light intensity threshold is set in the database of the smart terminal, usually set to 200lx, when the ambient light is stronger than 200lx, infrared light is used as the emitted light to emit to the user's eyeball, and when the ambient light intensity is less than 200lx, the visible light is used as The emitted light is emitted toward the eyes of the user.
  • an emission angle for emitting visible light or infrared light to the user's eyeball is determined, and visible light or infrared light is emitted to the user according to the emission angle.
  • the emission angle range is generally within the range of 45 ° to 135 °. If the angle of light irradiating the eyeball exceeds this range, scattering will occur and affect the test effect.
  • the intensity and angle of incident infrared or visible light are limited by setting a light intensity threshold and a preset angle of illumination, so that the accuracy of the light receiver when receiving the reflected light from the eyeball is improved to operate the eyeball
  • the trajectory makes accurate judgments.
  • FIG. 2 is a schematic diagram of a process of establishing a mapping relationship in an embodiment of the present application.
  • the acquired eyeballs reflect the infrared rays or the visible light to form a reflected light signal, and track the reflection
  • the walking track of the optical signal to establish the correspondence between the walking track and the position of the display screen includes:
  • S201 Capture the reflected light signal formed by the reflected light of the user's eyeballs, and convert the reflected light signal into a reflected electrical signal according to the position and residence time of the reflected light signal;
  • the signal receiver uses a photosensitive panel provided on the display, and the photosensitive panel is coated with a semiconductor-type photosensitive medium In this kind of medium, the energy level transition will occur under the irradiation of infrared rays or visible light to generate electrical signals.
  • the intensity of the infrared or visible light absorbed by different positions of the photosensitive panel is different and the intensity of the generated electrical signal is also different.
  • the smart terminal When the passwords identified by all the main electrical signals or secondary electrical signals are consistent with the passwords pre-stored in the database, the smart terminal performs the unlocking operation.
  • a rectangular coordinate system is established on the screen, and the lower left corner of the screen can be used as the origin of coordinates, and then coordinates can be given to each point on the screen. position.
  • the reflection angle of the eyeball corresponding to the value of the main electrical signal is within the range of 80 ° to 100 °, it means that the reflected light is captured correctly this time;
  • the strong reflection point formed on the display screen by the reflected light signal is obtained according to the correspondence, and the strong reflection point is compared with the unlock password. If the verification result is consistent, Then perform the unlocking operation, and if it is inconsistent, re-emit infrared or visible light to re-enter the password in the eyes of the user, and the unlocking password is pre-stored in the database, including:
  • the processor checks the reflection point against the password pre-stored in the database of the smart terminal, and if the verification result is consistent, an unlock operation is performed, which is inconsistent Then, re-emit infrared rays or visible light to re-enter the password in the eyes of the user.
  • the value range of k is preferably [1/2, 2], and the slope within this range can effectively improve the accuracy of password recognition.
  • the strong reflection point formed on the display screen by the reflected light signal is obtained according to the correspondence, and the strong reflection point is compared with the unlock password. If the verification result is consistent, Then perform an unlocking operation, and if it is inconsistent, re-emit infrared rays or visible light to the user's eyeball and re-enter the password, and the unlocking password is pre-stored in the database. After entering the password, the operation steps when it still cannot be unlocked include:
  • the infrared emitter or the visible light emitter when unlocking for the second time, emits light beams of different wavelengths to the user's eyeballs as compared with the first unlocking, to prevent erroneous judgment of the reflected light walking path due to surrounding environmental factors,
  • the first identification 40 ⁇ m of visible light is used
  • the second identification 60 ⁇ m of visible light is used, and the length of the light wave used twice is as large as possible; or the first use of visible light as the source of incident light
  • the second Secondly, infrared light is used as the light source of the incident light, and the difference between the two light sources during the emission process is used for comprehensive identification to avoid errors in the single light source identification process.
  • the optical signal tracking module is configured to acquire the infrared light or the visible light reflected by the user's eyeballs to form a reflected light signal, track the walking path of the reflected light signal, and establish a correspondence between the walking path and the position of the display screen relationship;
  • the data processing module is configured to obtain the strong reflection point formed on the display screen by the reflected light signal according to the corresponding relationship, and compare the strong reflection point with the unlock password, and if the verification result is consistent, proceed If the unlocking operation is inconsistent, re-emit infrared rays or visible light to re-enter the password in the eyes of the user, and the unlocking password is pre-stored in the database.
  • the light intensity capturing module is set to collect ambient light and perform photoelectric conversion on the ambient light to obtain the ambient light intensity of the ambient light;
  • the included angle generating module is configured to obtain the included angle between the strong reflection point on the display screen and each point on the curved surface of the user's eyeball according to the corresponding relationship;
  • the password comparison module is configured to, when the angle between the strong reflection point and the eyeball is greater than or equal to the reflection angle threshold, compare the strong reflection point with the unlock password, and perform an unlock operation if the verification result is consistent , If it is inconsistent, re-emit infrared or visible light to the user's eyeball and re-enter the password.
  • mapping relationship module includes:
  • the coordinate establishment module is set to establish a coordinate system by using the center point of the area where the corresponding unlocked number on the display screen is located as the coordinate origin, the left and right directions as the X axis, and the up and down directions as the Y axis, for two adjacent numbers or The distance is A; take the origin of the coordinates as the center of the circle and draw a circle with radius R, where 3 / 4A ⁇ R ⁇ A;
  • the password comparison module further includes a re-unlocking module, which is configured to obtain the user's iris information when the infrared rays or visible light is re-entered into the user's eyeball and the password is re-entered, but the user still cannot unlock , Extract the iris feature points; compare the iris feature points with the pre-stored iris image information, and if the comparison is the same, unlock, otherwise lock the screen and upload the operation process to the cloud server; the unlock again module includes: :
  • the extraction module is set to obtain user's iris information and extract iris feature points
  • the comparison module is configured to compare the iris feature points with the pre-stored iris image information, and if the comparison is the same, unlock, otherwise lock the screen and upload the operation process to the cloud server.
  • the password comparison module further includes an error reporting module configured to issue a lock screen instruction if the password identified by the strong reflection point is still inconsistent with the pre-stored password after re-entry. Prohibit the user from unlocking operation and send error message; receive the error message, perform error analysis on the error message, if the error message is incorrect, perform unlock operation, otherwise collect face image on the user , Income into the database; the error reporting module, including:
  • the error reporting module is configured to, after re-entering, if the password identified by the strong reflection point is still inconsistent with the pre-stored password, then issue a lock screen instruction to prohibit the user from unlocking and send an error message;
  • the error reporting and analysis module is configured to receive the error reporting information, perform error analysis on the error reporting information, and perform an unlocking operation if the error reporting information is incorrect, otherwise collect face images of the user and collect them in the database.
  • a computer device in one embodiment, includes a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor executes the steps of the above-mentioned unlocking method based on eye movement trajectory.
  • a storage medium storing computer-readable instructions.
  • the one or more processors execute the above-mentioned eye movement trajectory-based Steps of unlocking method.
  • the storage medium may be a non-volatile storage medium.
  • the program may be stored in a computer-readable storage medium, and the storage medium may include: Read only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Lock And Its Accessories (AREA)

Abstract

L'invention concerne un procédé et un appareil de déverrouillage basé sur une trajectoire du mouvement des yeux, un dispositif informatique et un support de stockage. Le procédé consiste à : acquérir une intensité d'éclairage ambiant et sélectionner des rayons infrarouges ou une lumière visible en fonction de l'intensité d'éclairage ambiant pour irradier les globes oculaires d'un utilisateur avec des rayons lumineux; acquérir un signal de lumière réfléchie formé après que les rayons infrarouges ou la lumière visible sont réfléchis par les globes oculaires de l'utilisateur, suivre une trajectoire de déplacement du signal de lumière réfléchie et établir une corrélation entre la trajectoire de déplacement et la position d'un écran d'affichage; puis acquérir, en fonction de la corrélation, un point de réflexion fort formé sur l'écran d'affichage par le signal de lumière réfléchie et comparer le point de réflexion fort à un mot de passe de déverrouillage. Selon le procédé, une détermination précise d'une identité d'utilisateur peut être réalisée.
PCT/CN2018/124582 2018-11-20 2018-12-28 Procédé, appareil et dispositif de déverrouillage sur la base de la trajectoire du mouvement des yeux, et support de stockage WO2020103291A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811381597.3 2018-11-20
CN201811381597.3A CN109739344B (zh) 2018-11-20 2018-11-20 基于眼球运动轨迹的解锁方法、装置、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2020103291A1 true WO2020103291A1 (fr) 2020-05-28

Family

ID=66355712

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/124582 WO2020103291A1 (fr) 2018-11-20 2018-12-28 Procédé, appareil et dispositif de déverrouillage sur la base de la trajectoire du mouvement des yeux, et support de stockage

Country Status (2)

Country Link
CN (1) CN109739344B (fr)
WO (1) WO2020103291A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113420279A (zh) * 2021-05-28 2021-09-21 中国工商银行股份有限公司 一种密码输入方法及装置

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112130320A (zh) * 2019-06-24 2020-12-25 宏碁股份有限公司 头戴型显示装置及其调整方法
CN112446012A (zh) * 2019-08-28 2021-03-05 南京深视光点科技有限公司 眼球追踪解锁系统及其实施方法
CN112862450A (zh) * 2021-03-02 2021-05-28 岭东核电有限公司 试验信息展示方法、装置、计算机设备和存储介质
CN114706487A (zh) * 2022-04-15 2022-07-05 青岛虚拟现实研究院有限公司 字符输入方法、装置、电子设备及可读存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104461014A (zh) * 2014-12-26 2015-03-25 小米科技有限责任公司 屏幕解锁方法及装置
CN104636648A (zh) * 2013-11-15 2015-05-20 英业达科技有限公司 虹膜解锁系统及其方法
CN105425968A (zh) * 2015-12-17 2016-03-23 无锡天脉聚源传媒科技有限公司 一种屏幕解锁方法及装置
CN106445364A (zh) * 2016-08-30 2017-02-22 上海卓易科技股份有限公司 一种智能终端的解锁方法、解锁系统及智能终端
CN106778172A (zh) * 2016-12-13 2017-05-31 北京维熙安邦科技有限公司 一种身份认证方法
CN108650408A (zh) * 2018-04-13 2018-10-12 维沃移动通信有限公司 一种屏幕解锁方法和移动终端

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674047A (zh) * 2004-03-25 2005-09-28 上海大学 基于微机并行处理结构的六自由度视觉跟踪方法及系统
PL229076B1 (pl) * 2010-07-27 2018-06-29 Politechnika Gdanska Układ do pomiaru położenia punktu fiksacji wzroku użytkownika na powierzchni ekranu komputerowego
CN105354545A (zh) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 虹膜信息的采集方法及采集系统
CN106097402A (zh) * 2016-06-20 2016-11-09 深圳市麦谷科技有限公司 一种判断目标点是否位于预定区域内的方法及系统
CN106502378A (zh) * 2016-09-08 2017-03-15 深圳市元征科技股份有限公司 一种电子设备界面的控制方法及电子设备
US10796178B2 (en) * 2016-12-15 2020-10-06 Beijing Kuangshi Technology Co., Ltd. Method and device for face liveness detection
CN108733203A (zh) * 2017-04-20 2018-11-02 上海耕岩智能科技有限公司 一种眼球追踪操作的方法和装置
CN107451443A (zh) * 2017-07-14 2017-12-08 广东欧珀移动通信有限公司 虹膜识别方法及相关产品
CN107463893A (zh) * 2017-07-28 2017-12-12 广东欧珀移动通信有限公司 虹膜识别方法和移动终端
CN107580114B (zh) * 2017-08-24 2020-07-28 Oppo广东移动通信有限公司 生物识别方法、移动终端以及计算机可读存储介质
CN108628448B (zh) * 2018-04-12 2019-12-06 Oppo广东移动通信有限公司 亮屏方法、装置、移动终端及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104636648A (zh) * 2013-11-15 2015-05-20 英业达科技有限公司 虹膜解锁系统及其方法
CN104461014A (zh) * 2014-12-26 2015-03-25 小米科技有限责任公司 屏幕解锁方法及装置
CN105425968A (zh) * 2015-12-17 2016-03-23 无锡天脉聚源传媒科技有限公司 一种屏幕解锁方法及装置
CN106445364A (zh) * 2016-08-30 2017-02-22 上海卓易科技股份有限公司 一种智能终端的解锁方法、解锁系统及智能终端
CN106778172A (zh) * 2016-12-13 2017-05-31 北京维熙安邦科技有限公司 一种身份认证方法
CN108650408A (zh) * 2018-04-13 2018-10-12 维沃移动通信有限公司 一种屏幕解锁方法和移动终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113420279A (zh) * 2021-05-28 2021-09-21 中国工商银行股份有限公司 一种密码输入方法及装置

Also Published As

Publication number Publication date
CN109739344A (zh) 2019-05-10
CN109739344B (zh) 2021-12-14

Similar Documents

Publication Publication Date Title
WO2020103291A1 (fr) Procédé, appareil et dispositif de déverrouillage sur la base de la trajectoire du mouvement des yeux, et support de stockage
US9195900B2 (en) System and method based on hybrid biometric detection
WO2019080580A1 (fr) Procédé et appareil d'authentification d'identité de visage 3d
WO2019080579A1 (fr) Procédé et appareil d'authentification d'identité de visage en 3d
US20130129164A1 (en) Identity recognition system and method based on hybrid biometrics
US20100079243A1 (en) Authentication system, authentication method, and authentication program
CN104881632A (zh) 高光谱人脸识别方法
US11232284B2 (en) Techniques for robust anti-spoofing in biometrics using polarization cues for NIR and visible wavelength band
JP2010049664A (ja) 静脈撮像装置、静脈撮像方法および静脈認証装置
US20100226545A1 (en) Vein pattern management system, vein pattern registration apparatus, vein pattern authentication apparatus, vein pattern registration method, vein pattern authentication method, program, and vein data configuration
KR101724971B1 (ko) 광각 카메라를 이용한 얼굴 인식 시스템 및 그를 이용한 얼굴 인식 방법
CN104992163A (zh) 一种人脸图像与虹膜图像同时采集光学装置及其身份认证方法
US20210350126A1 (en) Iris authentication device, iris authentication method, and recording medium
US20100208948A1 (en) Vein Pattern Management System, Vein Pattern Registration Apparatus, Vein Pattern Authentication Apparatus, Vein Pattern Registration Method, Vein Pattern Authentication Method, Program, and Vein Data Configuration
US20230386256A1 (en) Techniques for detecting a three-dimensional face in facial recognition
KR20130133676A (ko) 카메라를 통한 얼굴인식을 이용한 사용자 인증 방법 및 장치
CN111699678B (zh) 使用面部id感测的安全检查系统和安全检查方法
KR102151851B1 (ko) 적외선 영상 기반 얼굴 인식 방법 및 이를 위한 학습 방법
KR101718244B1 (ko) 얼굴 인식을 위한 광각 영상 처리 장치 및 방법
US20240119130A1 (en) Authentication System, Device, and Method
CN114120376A (zh) 一种多模态图像采集装置及系统
KR20190121508A (ko) 카메라 다중영상 분석을 이용한 조명환경 보상 기반의 생체인식 처리 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18940810

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18940810

Country of ref document: EP

Kind code of ref document: A1