WO2022088867A1 - 一种指纹验证方法、电子设备与服务器 - Google Patents

一种指纹验证方法、电子设备与服务器 Download PDF

Info

Publication number
WO2022088867A1
WO2022088867A1 PCT/CN2021/113775 CN2021113775W WO2022088867A1 WO 2022088867 A1 WO2022088867 A1 WO 2022088867A1 CN 2021113775 W CN2021113775 W CN 2021113775W WO 2022088867 A1 WO2022088867 A1 WO 2022088867A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
electronic device
information
server
account
Prior art date
Application number
PCT/CN2021/113775
Other languages
English (en)
French (fr)
Inventor
黄丽薇
杨智辉
Original Assignee
荣耀终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 荣耀终端有限公司 filed Critical 荣耀终端有限公司
Publication of WO2022088867A1 publication Critical patent/WO2022088867A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • the present application relates to the field of electronic technology, and in particular, to a fingerprint verification method, an electronic device and a server.
  • Fingerprints include many feature points, which provide confirmation information of the uniqueness of the fingerprint and are the biometric features that distinguish a user from other users. Fingerprint verification technology has the characteristics of high recognition and high security, and is widely used in user identity verification of electronic devices, such as device unlock verification, payment verification, or application opening verification.
  • the current fingerprint verification process is as follows: Step 1, the electronic device enters the fingerprint 1, and the fingerprint 1 is used for unlocking the electronic device. For example, the user can input the fingerprint 1 to the electronic device through the touched fingerprint input area; Step 2, the electronic device extracts the fingerprint The fingerprint feature of 1 (referred to as fingerprint feature 1) is stored locally; step 3, the electronic device displays the fingerprint verification interface, and detects the touch operation performed by the user on the fingerprint verification interface, obtains fingerprint 2, and uses fingerprint feature 1. Match with the fingerprint feature of fingerprint 2 to obtain the verification result; Step 4, in the case where the verification result indicates that the verification is successful, the electronic device is successfully unlocked, and when the verification result indicates that the verification fails, the electronic device fails to unlock, as shown in Figure 1 .
  • Step 1 the electronic device enters the fingerprint 1, and the fingerprint 1 is used for unlocking the electronic device.
  • the user can input the fingerprint 1 to the electronic device through the touched fingerprint input area
  • Step 2 the electronic device extracts the fingerprint
  • the fingerprint feature of 1 (referred to as fingerprint feature 1) is stored locally
  • step 3 the
  • the current fingerprint verification requires the user to touch the fingerprint verification area of the electronic device, that is, the user needs to have close contact with the electronic device and cannot control the electronic device remotely.
  • the parent can remotely control the duration of the child's use of the smart device.
  • the purpose of this application is to provide a fingerprint verification method, an electronic device and a server, and the method is used to realize remote fingerprint verification.
  • an embodiment of the present application provides a fingerprint verification method, and the method can be executed by a first electronic device, such as a mobile phone, a tablet computer, and the like.
  • the method includes: the first electronic device receives first information from a server, wherein the first information includes a first identification, and the first identification is an identification of a first fingerprint; displaying a first fingerprint verification interface, and detecting the first user The first operation performed on the first fingerprint verification interface; in response to the first operation, obtaining a second fingerprint; matching the second fingerprint with the first fingerprint; sending a first matching result to the server, where the first matching result is used to indicate The matching succeeds or the matching fails, and the first matching result is used for unlocking the electronic device associated with the first identification.
  • the first electronic device displays the first fingerprint verification interface in response to the first information, and detects the user's first operation on the first fingerprint verification interface to acquire the second fingerprint. After that, the second fingerprint is matched with the first fingerprint to obtain a first matching result, and the first matching result can be used to unlock the electronic device associated with the first identification, thereby realizing remote fingerprint verification.
  • the first information further includes first account information, where the first account information is used to indicate an account associated with the first fingerprint.
  • the server or the electronic device can store the fingerprint with the account number as the index. For example, on the electronic device side, the account number, the identification of the fingerprint and the fingerprint feature can be associated, and on the server side, the account number, the electronic device and the fingerprint can be associated. The three identifiers are associated, so that multi-fingerprint remote verification under different accounts can be realized.
  • the method before receiving the first information from the server, the method further includes: receiving second information from the server, where the second information is information obtained by encrypting the first fingerprint feature, the first fingerprint feature is the feature of the first fingerprint; the first fingerprint is matched with all or part of the fingerprints stored in the first electronic device; third information is sent to the server, wherein, in the case that the first electronic device stores the first fingerprint, the third The information includes the first identifier, and in the case that the first electronic device does not store the first fingerprint, the third message is used to indicate that the first electronic device does not store the first fingerprint.
  • the second electronic device can receive the second information from the first electronic device, and based on the second information, determine whether the second electronic device stores the first fingerprint, and then store the first fingerprint in the second electronic device.
  • the identification of the first fingerprint that is, the first identification
  • the second information is obtained by encrypting the first fingerprint feature, which can avoid the transmission of the fingerprint feature in the network, and ensure the security and confidentiality of the fingerprint feature.
  • an embodiment of the present application provides a fingerprint verification method, and the method can be executed by a server, such as a cloud server, a single server, or a server cluster.
  • the server receives first information from the second electronic device, wherein the first information includes a first identifier, and the first identifier is an identifier of the first fingerprint; the server determines the first electronic device associated with the first information; The server sends the first information to the first electronic device; the server receives the first matching result from the first electronic device, the first matching result is used to indicate whether the matching succeeds or the matching fails, and the first matching result is used for unlocking the second electronic device ; The server sends the first matching result to the second electronic device.
  • the first information further includes first account information, where the first account information is used to indicate an account associated with the first fingerprint.
  • the method before receiving the first information from the second electronic device, the method further includes:
  • Receive second information from the second electronic device the second information is the information obtained by encrypting the first fingerprint feature, and the first fingerprint feature is the feature of the first fingerprint; send the second information to the first electronic device; receive from The third information of the first electronic device, wherein, in the case that the first electronic device stores the first fingerprint, the third information includes the first identification, and in the case that the first electronic device does not store the first fingerprint, the third information It is used to indicate that the first electronic device does not store the first fingerprint; and the first identification is sent to the second electronic device.
  • sending the first identification to the second electronic device includes: when the first electronic device stores the first fingerprint, sending third information to the second electronic device; or, in the first electronic device When an electronic device does not store the first fingerprint, configure the first identification for the first fingerprint, and send the first identification to the second electronic device.
  • the server can configure an identifier for the first fingerprint. Since the server maintains the correspondence between the electronic device and the fingerprint identifier, the server assigns the same identifier to ensure the uniqueness of the fingerprint identifier.
  • an embodiment of the present application provides a fingerprint verification method, which can be performed by a second electronic device, such as a mobile phone, a tablet computer, and the like.
  • the second electronic device displays a lock screen interface; the second electronic device fails to unlock the lock screen interface; the second electronic device sends first information to the server, where the first information is used to request to unlock the second electronic device, wherein , the first information includes a first identification, the first identification is an identification of a first fingerprint, and the first fingerprint is a fingerprint stored by the second electronic device for unlocking the second electronic device; the second electronic device receives the first fingerprint from the server.
  • a matching result the first matching result is used to indicate whether the matching is successful or the matching fails; the second electronic device displays the unlocked interface when the first matching result indicates that the matching is successful.
  • the first information further includes first account information, where the first account information is used to indicate an account associated with the first fingerprint.
  • the method before displaying the lock screen interface, the method further includes: displaying a fingerprint entry interface, and detecting a second operation performed by the second user on the fingerprint entry interface; and in response to the second operation, obtaining the first fingerprint; determine second information, the second information is information obtained by encrypting the first fingerprint feature, and the first fingerprint feature is the feature of the first fingerprint; send the second information to the server; receive the first identification from the server.
  • the method before sending the second information to the server, the method further includes: matching the first fingerprint feature with all or part of the fingerprint features stored in the second electronic device, and the matching fails.
  • the failure to unlock the lock screen interface includes: the lock screen interface is successfully unlocked according to the third fingerprint stored by the second electronic device, and the lock screen is locked according to the first fingerprint stored by the second electronic device. The unlocking of the screen interface failed.
  • multi-fingerprint authentication can be realized, for example, multi-fingerprint authentication under the same account, or multi-fingerprint authentication under different accounts.
  • an embodiment of the present application provides a fingerprint verification method, which can be implemented by a system including a first electronic device, a server, and a second electronic device.
  • the second electronic device displays a lock screen interface; the second electronic device fails to unlock the lock screen interface; the second electronic device sends first information to the server, where the first information is used to request to unlock the second electronic device, wherein , the first information includes a first identification, the first identification is the identification of the first fingerprint, and the first fingerprint is a fingerprint stored by the second electronic device for unlocking the second electronic device; the server sends the first information to the first fingerprint.
  • the electronic device, the first electronic device and the second electronic device are all associated with the first information; the first electronic device displays the first fingerprint verification interface, and detects the first operation performed by the first user on the first fingerprint verification interface; An electronic device acquires a second fingerprint in response to the first operation; the first electronic device matches the second fingerprint with the first fingerprint; the first electronic device sends a first matching result to the server, where the first matching result is used to indicate successful matching Or the matching fails; the server sends the first matching result to the second electronic device; if the first matching result indicates that the matching is successful, the second electronic device displays the unlocked interface.
  • the first information further includes first account information, where the first account information is used to indicate an account associated with the first fingerprint.
  • the method before the second electronic device displays the screen lock interface, the method further includes: the second electronic device displays a fingerprint entry interface, and detects a second operation by the second user on the fingerprint entry interface; The electronic device acquires the first fingerprint in response to the second operation; the second electronic device determines the second information, the second information is the information obtained by encrypting the first fingerprint feature, and the first fingerprint feature is the feature of the first fingerprint; The second electronic device sends the second information to the server; the server sends the second information to the first electronic device; the first electronic device matches the first fingerprint with all or part of the fingerprints stored in the first electronic device; the first electronic device sends the second information to the server the third information, wherein, in the case that the first electronic device stores the first fingerprint, the third information includes the first identifier, and in the case that the first electronic device does not store the first fingerprint, the third information is used to indicate the first The electronic device does not store the first fingerprint; the server sends the first identification to the second electronic device.
  • the server sending the first identification to the second electronic device includes: in the case that the first electronic device stores the first fingerprint, the server sends the third information to the second electronic device; or, In the case where the first electronic device does not store the first fingerprint, the server configures the first identification for the first fingerprint, and sends the first identification to the second electronic device.
  • the method before the second electronic device sends the second information to the server, the method further includes: the second electronic device matches the first fingerprint feature with all or part of the fingerprint features stored in the second electronic device, and both Match failed.
  • the failure to unlock the lock screen interface by the second electronic device includes: the second electronic device successfully unlocks the lock screen interface according to the third fingerprint stored by the second electronic device, and according to the second electronic device The first fingerprint stored in the device fails to unlock the lock screen interface.
  • an embodiment of the present application further provides an electronic device, which may be the first electronic device in the first aspect or the fourth aspect, including: a communication module for communicating with other devices; one or more a processor; one or more memories; the one or more memories have stored thereon one or more computer programs, the one or more computer programs comprising instructions that when executed by the one or more processors When executed, the electronic device is caused to perform all or part of the method steps performed by the first electronic device in the fingerprint verification solution provided in the first aspect or the fourth aspect.
  • an embodiment of the present application further provides a server, which may be the server in the first aspect or the fourth aspect, including: a communication module for communicating with other devices; one or more processors; a or more memories; the one or more memories have stored therein one or more computer programs comprising instructions that, when executed by the one or more processors, cause The server performs all or part of the method steps performed by the server in the fingerprint authentication scheme provided in the first aspect or the fourth aspect.
  • a server which may be the server in the first aspect or the fourth aspect, including: a communication module for communicating with other devices; one or more processors; a or more memories; the one or more memories have stored therein one or more computer programs comprising instructions that, when executed by the one or more processors, cause The server performs all or part of the method steps performed by the server in the fingerprint authentication scheme provided in the first aspect or the fourth aspect.
  • an embodiment of the present application further provides an electronic device, which may be the second electronic device in the first aspect or the fourth aspect, including: a communication module for communicating with other devices; one or more a processor; one or more memories; the one or more memories have stored thereon one or more computer programs, the one or more computer programs including instructions, when the instructions are processed by the one or more When the device is executed, the electronic device is made to execute all or part of the method steps executed by the second electronic device in the fingerprint verification solution provided in the first aspect or the fourth aspect.
  • an embodiment of the present application further provides a fingerprint verification system, including a first electronic device, a second electronic device, and a server, where the first electronic device is the electronic device described in the fifth aspect, and the second electronic device is the electronic device described in the fifth aspect.
  • a fingerprint verification system including a first electronic device, a second electronic device, and a server, where the first electronic device is the electronic device described in the fifth aspect, and the second electronic device is the electronic device described in the fifth aspect.
  • the server is the server according to the sixth aspect.
  • the fingerprint verification system can perform all or part of the method steps in the fingerprint verification scheme provided in the fourth aspect above.
  • an embodiment of the present application further provides a chip, which is coupled to a memory in an electronic device, and implements the first aspect of the embodiment of the present application and any possible design technical solutions of the first aspect, or implements the present application.
  • a chip which is coupled to a memory in an electronic device, and implements the first aspect of the embodiment of the present application and any possible design technical solutions of the first aspect, or implements the present application.
  • Embodiments The third aspect and any possible design technical solutions of the third aspect; "coupled" in the embodiments of the present application means that two components are directly or indirectly combined with each other.
  • an embodiment of the present application further provides a chip, the chip is coupled to a memory in a server, and implements the second aspect of the embodiment of the present application and any possible design technical solutions of the second aspect; in the embodiment of the present application "Coupled" means that two components are joined directly or indirectly to each other.
  • an embodiment of the present application further provides a chip, which is coupled to a memory in a fingerprint verification system, and implements the fourth aspect of the embodiment of the present application and any possible design technical solutions of the fourth aspect;
  • the present application "Coupled" in the embodiments means that two components are directly or indirectly coupled to each other.
  • an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and the computer program includes program instructions, and when the program instructions are executed by a computer, make The computer executes the technical solutions of the first aspect and any possible designs of the first aspect of the embodiments of the present application, or executes the technical solutions of the third aspect and any possible designs of the third aspect of the embodiments of the present application.
  • an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and the computer program includes program instructions, and when the program instructions are executed by a computer, make The computer executes the technical solutions of the second aspect and any possible designs of the second aspect of the embodiments of the present application.
  • an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and the computer program includes program instructions, and when the program instructions are executed by a computer, make The computer executes the technical solutions of the fourth aspect and any possible designs of the fourth aspect of the embodiments of the present application.
  • an embodiment of the present application provides a program product, where the program product stores a computer program, the computer program includes program instructions, and when the program instructions are executed by a computer, the computer is made to execute the program as described herein.
  • the technical solution of the first aspect and any possible design of the first aspect of the embodiment of the application is implemented, or the technical solution of any possible design of the third aspect and the third aspect of the embodiment of the application is implemented.
  • an embodiment of the present application provides a program product.
  • the program product stores a computer program, and the computer program includes program instructions.
  • the program instructions When the program instructions are executed by a computer, the computer is made to execute the program as described herein.
  • an embodiment of the present application provides a program product.
  • the program product stores a computer program, and the computer program includes program instructions.
  • the program instructions When the program instructions are executed by a computer, the computer is made to execute the program as described herein.
  • FIG. 1 is a schematic diagram of a fingerprint verification method in the application
  • FIG. 2 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a software structure of an electronic device provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a fingerprint entry method provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of a fingerprint input interface provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a verification mode selection interface provided by an embodiment of the present application.
  • FIG. 8 is still another schematic diagram of a fingerprint input interface provided by an embodiment of the present application.
  • FIG. 9 is another schematic diagram of a fingerprint input interface provided by an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a fingerprint verification method provided by an embodiment of the present application.
  • FIG. 11 is a schematic diagram of a second fingerprint verification interface provided by an embodiment of the present application.
  • FIG. 12 is another schematic diagram of a second fingerprint verification interface provided by an embodiment of the present application.
  • FIG. 13 is still another schematic diagram of a second fingerprint verification interface provided by an embodiment of the present application.
  • FIG. 14 is a schematic diagram of a first fingerprint verification interface provided by an embodiment of the present application.
  • 15 is a schematic flowchart of another fingerprint verification method provided by an embodiment of the present application.
  • 16 is a schematic flowchart of another fingerprint entry method provided by an embodiment of the present application.
  • FIG. 17 is a schematic flowchart of another fingerprint verification method provided by an embodiment of the present application.
  • FIG. 18 is a schematic flowchart of another fingerprint verification method provided by an embodiment of the present application.
  • references in this specification to "one embodiment” or “some embodiments” and the like mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically emphasized otherwise.
  • the terms “including”, “including”, “having” and their variants mean “including but not limited to” unless specifically emphasized otherwise.
  • At least one involved in the embodiments of the present application includes one or more; wherein, multiple refers to greater than or equal to two.
  • words such as “first” and “second” are only used for the purpose of distinguishing the description, and should not be understood as indicating or implying relative importance, nor should it be understood as indicating or implied order.
  • the application program (application, app) involved in the embodiments of the present application is a software program capable of implementing one or more specific functions.
  • multiple applications may be installed in an electronic device, for example, instant messaging applications, video applications, audio applications, image capturing applications, and the like.
  • instant messaging applications for example, may include SMS applications, WeChat (WeChat), WhatsApp Messenger, Line, photo sharing (instagram), Kakao Talk, DingTalk, and the like.
  • Image capturing applications for example, may include camera applications (system cameras or third-party camera applications).
  • Video applications for example, may include Youtube, Twitter, Douyin, iQiyi, Tencent Video, and so on.
  • Audio applications may include Kugou Music, Xiami, QQ Music, and so on.
  • the applications mentioned in the following embodiments may be applications that have been installed when the electronic device leaves the factory, or may be applications downloaded by the user from the network or obtained from other electronic devices during the use of the electronic device.
  • Embodiments of the present application provide a fingerprint verification method, an electronic device, and a server, which aim to realize remote unlocking management of the electronic device by a user, such as a parent remotely controlling the duration of a child's use of a smart device.
  • the method, the electronic device and the server are all based on the same technical concept. Since the principles of the method, the electronic device and the server to solve the problem are similar, the implementation of the electronic device, the server and the method can be referred to each other, and the repetition will not be repeated.
  • a fingerprint verification method provided by the embodiments of the present application can be applied to mobile phones, tablet computers, wearable devices (for example, watches, wristbands, smart helmets, etc.), in-vehicle devices, smart homes, and augmented reality (AR) /Virtual reality (VR) devices, notebook computers, ultra-mobile personal computers (UMPCs), netbooks, personal digital assistants (personal digital assistants, PDAs) and other electronic devices.
  • wearable devices for example, watches, wristbands, smart helmets, etc.
  • in-vehicle devices smart homes
  • AR augmented reality
  • VR Virtual reality
  • notebook computers notebook computers
  • netbooks personal digital assistants
  • PDAs personal digital assistants
  • FIG. 2 shows a schematic diagram of an application scenario provided by an embodiment of the present application.
  • the scenario includes a server, an electronic device 1, an electronic device 2, and an electronic device 3, and the electronic device in FIG. 2 is described by taking a mobile phone as an example.
  • the black filling is used to indicate that the electronic device is in a standby state or a shutdown state
  • the white filling is used to indicate that the electronic device is in a working state.
  • electronic device 1 and electronic device 2 are in a working state
  • electronic device 3 is in a standby state.
  • a network connection can be established between the electronic device 1 and the server, so that the server can provide network services for the electronic device 1 .
  • a network connection can be established between the electronic device 2 and the server, so that the server can provide network services for the electronic device 2.
  • a network connection can also be established between the electronic device 3 and the server, so that the server provides network services for the electronic device 3 .
  • Communication between the electronic device 1 and the electronic device 2, or between the electronic device 1 and the electronic device 3, or between the electronic device 2 and the electronic device 3 can be performed through a server.
  • electronic device 1 locally stores fingerprint 1, fingerprint 2, fingerprint 3, and fingerprint 4
  • electronic device 2 locally stores fingerprint 3, fingerprint 4, fingerprint 5, and fingerprint 6,
  • electronic device 3 locally stores fingerprint 4, fingerprint 7, Fingerprint 8.
  • the user 1 performs a touch operation on the fingerprint verification interface of the electronic device 1 .
  • the electronic device 1 acquires the fingerprint 9 , and matches the fingerprint 9 with the fingerprint 4 for unlocking the electronic device 1 . If the matching is successful, the electronic device 1 is successfully unlocked; if the matching fails, the electronic device 1 fails to be unlocked. Further, the electronic device 1 may send an authentication request message to the server, where the authentication request message is used to unlock the electronic device 1 .
  • the server may send the verification request message to the electronic device 2 or the electronic device 3 in which the fingerprint 4 is recorded.
  • the electronic device 2 displays the fingerprint verification interface, and detects the touch operation of the user 2 on the fingerprint verification interface of the electronic device 2 .
  • the fingerprint 10 is acquired, the fingerprint 10 is matched with the fingerprint 4, a matching result is obtained, and the matching result is sent to the electronic device 1 through the server. If the matching result indicates that the matching is successful, the electronic device 1 is successfully unlocked; if the matching result indicates that the matching fails, the electronic device 1 fails to be unlocked.
  • FIG. 3 shows a schematic structural diagram of an electronic device.
  • the electronic device shown in FIG. 3 may be the electronic device 1 , the electronic device 2 or the electronic device 3 in the scenario shown in FIG. 2 .
  • the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charge management module 140, a power management module 141, a battery 142, Antenna 1, Antenna 2, Mobile Communication Module 150, Wireless Communication Module 160, Audio Module 170, Speaker 170A, Receiver 170B, Microphone 170C, Headphone Interface 170D, Sensor Module 180, Key 190, Motor 191, Indicator 192, Camera 193, Display screen 194, and subscriber identification module (subscriber identification module, SIM) card interface 195 and so on.
  • SIM subscriber identification module
  • the processor 110 may include one or more processing units, for example, the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait.
  • different processing units may be independent devices, or may be integrated in one or more processors.
  • the controller can be the nerve center and command center of the electronic device. The controller can generate an operation control signal according to the instruction operation code and timing signal, and complete the control of fetching and executing instructions.
  • a memory may also be provided in the processor 110 for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may hold instructions or data that have just been used or recycled by the processor 110 . If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby increasing the efficiency of the system.
  • the USB interface 130 is an interface that conforms to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 130 can be used to connect a charger to charge the electronic device, and can also be used to transmit data between the electronic device and peripheral devices.
  • the charging management module 140 is used to receive charging input from the charger.
  • the power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 .
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140 and supplies power to the processor 110 , the internal memory 121 , the external memory, the display screen 194 , the camera 193 , and the wireless communication module 160 .
  • the wireless communication function of the electronic device can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modulation and demodulation processor, the baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in an electronic device can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • the antenna 1 can be multiplexed as a diversity antenna of the wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 150 can provide a wireless communication solution including 2G/3G/4G/5G etc. applied on the electronic device.
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA) and the like.
  • the mobile communication module 150 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modulation and demodulation processor, and then turn it into an electromagnetic wave for radiation through the antenna 1 .
  • at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 may be provided in the same device as at least part of the modules of the processor 110 .
  • the wireless communication module 160 can provide applications on electronic devices including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), global navigation satellite systems (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • WLAN wireless local area networks
  • BT wireless fidelity
  • GNSS global navigation satellite systems
  • frequency modulation frequency modulation
  • FM near field communication technology
  • NFC near field communication
  • IR infrared technology
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110 , perform frequency modulation on it, amplify it, and convert it into electromagnetic waves for radiation through
  • the antenna 1 of the electronic device is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the electronic device can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code Division Multiple Access (WCDMA), Time Division Code Division Multiple Access (TD-SCDMA), Long Term Evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include a global positioning system (global positioning system, GPS), a global navigation satellite system (GLONASS), a Beidou navigation satellite system (BDS), a quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the display screen 194 is used to display the display interface of the application and the like.
  • Display screen 194 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode or an active-matrix organic light-emitting diode (active-matrix organic light).
  • LED diode AMOLED
  • flexible light-emitting diode flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (quantum dot light emitting diodes, QLED) and so on.
  • the electronic device may include 1 or N display screens 194 , where N is a positive integer greater than 1.
  • the display screen 194 can be used to display the fingerprint verification interface, so that the user can touch the fingerprint verification interface to realize the input of the verification fingerprint. And, the display screen 194 is also used to display the fingerprint entry interface, so that the user can touch the fingerprint entry interface to complete the entry of the local fingerprint.
  • Camera 193 is used to capture still images or video.
  • the camera 193 may include at least one camera, eg, a front-facing camera and a rear-facing camera.
  • Internal memory 121 may be used to store computer executable program code, which includes instructions.
  • the processor 110 executes various functional applications and data processing of the electronic device by executing the instructions stored in the internal memory 121 .
  • the internal memory 121 may include a storage program area and a storage data area.
  • the storage program area may store the operating system, and the software code of at least one application (eg, iQIYI application, WeChat application, etc.).
  • the storage data area can store data (such as images, videos, etc.) generated during the use of the electronic device.
  • the internal memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (UFS), and the like.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to realize the data storage function. Such as saving pictures, videos and other files in an external memory card.
  • the electronic device can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone jack 170D, and the application processor. Such as music playback, recording, etc.
  • the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and an environmental sensor Light sensor 180L, bone conduction sensor 180M, etc.
  • the pressure sensor 180A is used to sense pressure signals, and can convert the pressure signals into electrical signals.
  • the pressure sensor 180A may be provided on the display screen 194 .
  • the gyro sensor 180B can be used to determine the motion attitude of the electronic device.
  • the angular velocity of the electronic device about three axes ie, the x, y, and z axes
  • the gyro sensor 180B can be used for image stabilization.
  • the air pressure sensor 180C is used to measure air pressure.
  • the electronic device calculates the altitude from the air pressure value measured by the air pressure sensor 180C to assist in positioning and navigation.
  • the magnetic sensor 180D includes a Hall sensor.
  • the electronic device can use the magnetic sensor 180D to detect the opening and closing of the flip holster.
  • the electronic device when the electronic device is a flip machine, the electronic device can detect the opening and closing of the flip according to the magnetic sensor 180D. Further, according to the detected opening and closing state of the leather case or the opening and closing state of the flip cover, characteristics such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 180E can detect the magnitude of the acceleration of the electronic device in various directions (generally three axes).
  • the magnitude and direction of gravity can be detected when the electronic device is stationary. It can also be used to identify the posture of electronic devices, and can be used in applications such as horizontal and vertical screen switching, pedometers, etc.
  • Distance sensor 180F for measuring distance.
  • Electronic devices can measure distances by infrared or laser. In some embodiments, when shooting a scene, the electronic device can use the distance sensor 180F to measure the distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, light emitting diodes (LEDs) and light detectors, such as photodiodes.
  • the light emitting diodes may be infrared light emitting diodes.
  • Electronic devices emit infrared light outward through light-emitting diodes.
  • Electronic devices use photodiodes to detect reflected infrared light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object in the vicinity of the electronic device.
  • the electronic device can determine that there is no object in the vicinity of the electronic device.
  • the electronic device can use the proximity light sensor 180G to detect that the user holds the electronic device close to the ear to talk, so as to automatically turn off the screen to save power.
  • Proximity light sensor 180G can also be used in holster mode, pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 180L is used to sense ambient light brightness.
  • the electronic device can adaptively adjust the brightness of the display screen 194 according to the perceived brightness of the ambient light.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device is in the pocket to prevent accidental touch.
  • the fingerprint sensor 180H is used to collect fingerprints. Electronic devices can use the collected fingerprint characteristics to unlock fingerprints, access application locks, take photos with fingerprints, and answer incoming calls with fingerprints.
  • the temperature sensor 180J is used to detect the temperature.
  • the electronic device utilizes the temperature detected by the temperature sensor 180J to implement a temperature handling strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold value, the electronic device may reduce the performance of the processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection.
  • the electronic device when the temperature is lower than another threshold, the electronic device heats the battery 142 to avoid abnormal shutdown of the electronic device caused by the low temperature.
  • the electronic device boosts the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 180K also called “touch panel”.
  • the touch sensor 180K may be disposed on the display screen 194 , and the touch sensor 180K and the display screen 194 form a touch screen, also called a “touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near it.
  • the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
  • Visual output related to touch operations may be provided through display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the electronic device, which is different from the location where the display screen 194 is located.
  • the electronic device may acquire a fingerprint through the sensor module 180 .
  • the sensor module 180 may be the touch sensor 180K.
  • the display screen 194 displays a fingerprint verification interface, the user performs a touch operation on the fingerprint verification interface, and the touch sensor 180K detects the user's touch operation on the fingerprint verification interface, and acquires the user's fingerprint.
  • the display screen 194 displays a fingerprint entry interface, the user performs a touch operation on the fingerprint entry interface, and the touch sensor 180K detects the user's touch operation on the fingerprint entry interface, and acquires the user's fingerprint.
  • the bone conduction sensor 180M can acquire vibration signals.
  • the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human voice.
  • the bone conduction sensor 180M can also contact the pulse of the human body and receive the blood pressure beating signal.
  • the keys 190 include a power-on key, a volume key, and the like. Keys 190 may be mechanical keys. It can also be a touch key.
  • the electronic device may receive key input and generate key signal input related to user settings and function control of the electronic device.
  • Motor 191 can generate vibrating cues.
  • the motor 191 can be used for vibrating alerts for incoming calls, and can also be used for touch vibration feedback. For example, touch operations acting on different applications (such as taking pictures, playing audio, etc.) can correspond to different vibration feedback effects.
  • the indicator 192 can be an indicator light, which can be used to indicate the charging state, the change of the power, and can also be used to indicate a message, a missed call, a notification, and the like.
  • the SIM card interface 195 is used to connect a SIM card. The SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to achieve contact and separation with the electronic device.
  • the components shown in FIG. 3 do not constitute a specific limitation on the electronic device, and the electronic device may also include more or less components than those shown in the figure, or combine some components, or split some components, Or a different component arrangement.
  • the electronic device shown in FIG. 3 is used as an example for description.
  • FIG. 4 shows a block diagram of a software structure of an electronic device provided by an embodiment of the present application.
  • the software structure of the electronic device may be a layered architecture, for example, the software may be divided into several layers, and each layer has a clear role and division of labor. Layers communicate with each other through software interfaces.
  • the Android system is divided into four layers, which are, from top to bottom, an application layer, an application framework layer (framework, FWK), an Android runtime (Android runtime) and a system library, and a kernel layer.
  • the application layer can include a series of application packages. As shown in Figure 4, the application layer may include camera, settings, skin modules, user interface (UI), third-party applications, and the like. Among them, the three-party applications can include WeChat, QQ, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message and so on.
  • the user interface involved in the embodiments of the present application may be a fingerprint verification interface, a fingerprint input interface, or a lock screen interface, or the like.
  • the application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer.
  • the application framework layer can include some predefined functions. As shown in Figure 4, the application framework layer may include window managers, content providers, view systems, telephony managers, resource managers, notification managers, and the like.
  • a window manager is used to manage window programs.
  • the window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, take screenshots, etc.
  • Content providers are used to store and retrieve data and make these data accessible to applications.
  • the data may include video, images, audio, calls made and received, browsing history and bookmarks, phone book, etc.
  • the view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on. View systems can be used to build applications.
  • a display interface can consist of one or more views.
  • the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
  • the phone manager is used to provide the communication function of the electronic device 100 .
  • the management of call status including connecting, hanging up, etc.).
  • the resource manager provides various resources for the application, such as localization strings, icons, pictures, layout files, video files and so on.
  • the notification manager enables applications to display notification information in the status bar, which can be used to convey notification-type messages, and can automatically disappear after a brief pause without user interaction. For example, the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also display notifications in the status bar at the top of the system in the form of graphs or scroll bar text, such as notifications of applications running in the background, and notifications that appear on the screen in the form of dialog windows. For example, text information is prompted in the status bar, a prompt sound is issued, the electronic device vibrates, and the indicator light flashes.
  • the Android runtime includes core libraries and a virtual machine. Android runtime is responsible for scheduling and management of the Android system.
  • the core library consists of two parts: one is the function functions that the java language needs to call, and the other is the core library of Android.
  • the application layer and the application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application layer and the application framework layer as binary files.
  • the virtual machine is used to perform functions such as object lifecycle management, stack management, thread management, safety and exception management, and garbage collection.
  • a system library can include multiple functional modules. For example: surface manager (surface manager), media library (media library), 3D graphics processing library (eg: OpenGL ES), 2D graphics engine (eg: SGL), etc.
  • surface manager surface manager
  • media library media library
  • 3D graphics processing library eg: OpenGL ES
  • 2D graphics engine eg: SGL
  • the Surface Manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as still image files.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing.
  • 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display drivers, camera drivers, audio drivers, and sensor drivers.
  • the hardware layer may include various types of sensors, for example, an acceleration sensor, a gyroscope sensor, and a touch sensor involved in the embodiments of the present application.
  • the electronic device can detect the user's touch operation on the fingerprint verification interface through the touch sensor, obtain the user's fingerprint, and verify the user's fingerprint.
  • the electronic device can detect the touch operation performed by the user on the fingerprint entry interface through the touch sensor, acquire and store the user's fingerprint, and complete the entry process of the user's fingerprint.
  • the electronic device 1 displays a lock screen interface, detects the user's unlocking operation through the touch sensor 180K, and acquires the fingerprint 1 .
  • the backup judgment module in the system library layer is used for judging whether the fingerprint 1 matches the fingerprint 2 stored locally and used for unlocking the electronic device 1 . For example, when fingerprint 1 matches fingerprint 2, the display interface can be switched to the interface corresponding to the successful unlocking. In the case that the fingerprint 1 does not match the fingerprint 2, the electronic device 1 may send a verification request message to the server through the wireless communication module 160 or the mobile communication module 150.
  • the fingerprint verification method in the embodiment of the present application may be used for screen unlocking, secure payment unlocking, or APP permission unlocking, etc., which is not limited in the embodiment of the present application.
  • the present application takes the unlocking of the lock screen interface as an example to introduce the embodiments of the present application.
  • FIG. 5 is a schematic flowchart of a fingerprint input method according to an embodiment of the present application.
  • the method can be applied to the application scenario shown in FIG. 2 , for example, the first electronic device is the electronic device 2 in FIG. 2 , the server is the server in FIG. 2 , and the second electronic device is the electronic device 1 in FIG. 2 .
  • the application scenario shown in FIG. 2 as an example, the following describes the fingerprint entry method provided by the embodiment of the present application, and the process of the method is as follows.
  • S501 The electronic device 1 logs in to the account A.
  • the account A may be a user account of the electronic device 1, or a user account of an APP in the electronic device 1.
  • the following description takes account A as the user account of the electronic device 1 as an example.
  • user 1 can click the setting option of electronic device 1, select the account login interface of electronic device 1, and input account A and the login password of account A.
  • the electronic device 1 detects the login operation of the user 1 on the account login interface, and logs in the account A in response to the login operation of the user 1 .
  • the electronic device 1 may notify the server of the account A, and then the server may maintain the association relationship between the account and the electronic device. For example, electronic device 1 logs in to account A, electronic device 2 logs in to account A, and electronic device 3 logs in to account B, as shown in Table 1.
  • the electronic device 1 displays a fingerprint input interface.
  • the user can open the fingerprint entry interface of the electronic device 1 by pressing a button, touching or voice.
  • the fingerprint entry interface of the electronic device 1 may include a fingerprint entry area 61 . After the user puts the finger in the fingerprint entry area 61, the electronic device 1 can acquire the fingerprint of the finger.
  • the fingerprint entry interface of the electronic device 1 may also include an account display area 62 for displaying the account number corresponding to the fingerprints collected in the fingerprint entry area 61, that is, showing that the fingerprints currently collected in the fingerprint entry area 61 will be stored in the fingerprint entry area 61. under which account.
  • the fingerprint entry interface of the electronic device 1 may further include an exit option, as shown by the arrow in FIG. 6 , the user can exit the fingerprint entry interface by clicking the arrow.
  • S503 The electronic device 1 acquires a first fingerprint.
  • the user performs a second operation on the fingerprint entry interface, such as touching the fingerprint entry area 61 in the fingerprint entry interface.
  • the electronic device 1 acquires the first fingerprint input by the user.
  • the fingerprint collection and processing module 1 in the electronic device 1 can detect the user's second operation on the fingerprint entry area 61, and obtain the first fingerprint.
  • S504 The electronic device 1 matches the first fingerprint feature with all or part of the fingerprint features stored in the electronic device 1, and the matching fails.
  • the first fingerprint feature is a feature of the first fingerprint
  • the electronic device 1 can extract the feature of the first fingerprint to obtain the first fingerprint feature. Further, the electronic device 1 can match the first fingerprint feature with all or part of the fingerprint features stored in the electronic device 1 one by one, and the matching fails, which means that the first fingerprint is not stored under the account A of the electronic device 1 .
  • the electronic device 1 can match the first fingerprint feature with all the fingerprint features stored in the electronic device 1 one by one; In the case where some of the fingerprint features are stored with account A as an index, the electronic device 1 can match the first fingerprint feature with the fingerprint features stored with account A as an index in the electronic device 1 one by one.
  • the electronic device 1 maintains an association relationship among account numbers, fingerprint features, and fingerprint identifiers. As shown in Table 2, under account A, ID 1 corresponds to fingerprint feature 1, ID 2 corresponds to fingerprint feature 2, and ID 3 corresponds to fingerprint feature 3; under account B, ID 1 corresponds to fingerprint feature 4, and ID 2 corresponds to for fingerprint feature 2.
  • the electronic device 1 can match the first fingerprint feature with the fingerprint feature 1, the fingerprint feature 2, and the fingerprint feature 3 respectively through Table 2. For example, the electronic device 1 can first match the first fingerprint feature with the fingerprint feature 1.
  • the identification of the first fingerprint is identification 1, and the entry process of the first fingerprint ends; otherwise , the electronic device 1 matches the first fingerprint feature with the fingerprint feature 2, if the first fingerprint feature and the fingerprint feature 2 are successfully matched, the identification of the first fingerprint is the identification 2, and the input process of the first fingerprint ends; otherwise, the electronic device 1.
  • Match the first fingerprint feature with the fingerprint feature 3 if the first fingerprint feature and the fingerprint feature 3 are matched successfully, then the identification of the first fingerprint is the identification 3, and the entry process of the first fingerprint ends; otherwise, all matching fails, execute The content shown in step S505.
  • Table 2 Account number, fingerprint identification and correlation between fingerprint features
  • S505 The electronic device 1 sends the second information to the server, and accordingly, the server receives the second information.
  • the second information may be used to request to obtain the first identification
  • the first identification is the identification of the first fingerprint, such as the identification of the first fingerprint under account A.
  • the second information may be information obtained by encrypting or encoding the first fingerprint feature, so as to ensure the security and confidentiality of the fingerprint feature.
  • the electronic device 1 may encrypt (or encode) the first fingerprint feature by using a preset encryption method (or a preset encoding method).
  • the preset encryption mode or preset encoding mode may be pre-agreed by the electronic device 1 and the electronic device 2 .
  • the electronic device 1 may also send the account A to the server, and the server may know that the second information is the fingerprint information related to the account A.
  • the server can also obtain the account information currently logged in by the electronic device 1 in other ways. For example, before or at the same time when the electronic device 1 logs in to account A, it informs the server that electronic device 1 logs in to account A, then the server can store the login status of electronic device 1 as login account A.
  • S506 The server determines the electronic device 2.
  • the server may determine at least one electronic device with fingerprints stored under account A, and send the second information to some or all of the at least one electronic device, for example, the server sends the second information to the at least one electronic device.
  • electronic equipment in working condition the at least one electronic device includes electronic device 2 .
  • the server may maintain the association relationship between the account, the electronic device, and the identification of the fingerprint.
  • the server may determine which electronic device stores the fingerprint according to the association between the account number, the electronic device and the identification of the fingerprint. For example, as shown in Table 3, under account A: electronic devices 1 and 3 do not have fingerprint identifications, which means that electronic devices 1 and 3 do not store fingerprints under account A; electronic device 2 corresponds to identification 1 and identification 2, which means that electronic devices 1 and 3 do not store fingerprints under account A.
  • the electronic device 2 stores two fingerprints under account A.
  • electronic device 1 corresponds to ID 1 and ID 2, which means that electronic device 1 stores two fingerprints under account B;
  • electronic device 3 corresponds to ID 3, which means that electronic device 3 stores one fingerprint under account B. fingerprint.
  • the identification of each fingerprint under the same account is unique, and the fingerprints corresponding to the same identification under different accounts may be the same or different.
  • the electronic device 2 stores fingerprint 1 under both account A and account B, but the identification of fingerprint 1 under account A is identification 1, and the identification of the fingerprint under account B is identification 3.
  • the server can assign a first identification to the first fingerprint, and store the association relationship between account A, first identification 1 and electronic device 1, That is, the content shown in S510 is executed.
  • S507 The server sends the second information to the electronic device 2, and accordingly, the electronic device 2 receives the second information.
  • the second information may be used to request to obtain a first identifier, where the first identifier is an identifier of the first fingerprint, such as an identifier of the first fingerprint under an account.
  • the second information may be information obtained after the electronic device 1 encrypts or encodes the first fingerprint feature, so as to ensure the security and confidentiality of the fingerprint feature.
  • the electronic device 2 matches the first fingerprint feature with all or part of the fingerprint features stored in the electronic device 2 to obtain third information.
  • the third information includes the first identifier; in the case that the electronic device 2 does not store the first fingerprint, the third information is used to indicate that the electronic device 2 does not store the first fingerprint. fingerprint. For example, after the electronic device 2 decrypts or decodes the second information, a first fingerprint feature is obtained, and the first fingerprint feature is matched with some or all of the fingerprint features stored in the electronic device 2 one by one.
  • the electronic device 2 can match the first fingerprint feature with all the fingerprint features stored in the electronic device 2 one by one;
  • the electronic device 2 can match the first fingerprint feature with the fingerprint features stored with account A as an index in the electronic device 2 one by one.
  • the electronic device 2 matches the first fingerprint feature with all the fingerprint features stored by the electronic device 2 with the account A as the index one by one, and in the case of all matching failures, it means that the electronic device 2 does not store the first fingerprint; in the first fingerprint In the case where the feature is successfully matched with one of all the fingerprint features stored by the electronic device 2 with account A as the index, it means that the electronic device 2 stores the first fingerprint, and according to the relationship between the first fingerprint feature and the identification of the fingerprint, the first fingerprint is stored in the electronic device 2.
  • the association relationship (as shown in Table 2) determines the first identifier.
  • S509 The electronic device 2 sends the third information to the server, and accordingly, the server receives the third information.
  • the third information includes the first identifier or is used to indicate that the electronic device 2 does not store the first fingerprint.
  • the content shown in step S511 is executed; when the third information indicates that the electronic device 2 does not store the first fingerprint, the content shown in step S510 is executed.
  • the server configures the first identifier for the first fingerprint.
  • the server may configure the first identification for the first fingerprint according to the identification already used under account A, so that the first identification is unique under account A. For example, if the third information indicates that the electronic device 2 does not store the first fingerprint under the account A, the server may determine the first identification according to the identification of the fingerprint under the current account A through the lookup table 3. Taking Table 3 as an example, the identification of the fingerprint under the current account A includes identification 1 and identification 2, and the server can determine that the first identification is identification 3, or other identifications other than identification 1 and identification 2, which can ensure that each under the same account is identified. The uniqueness of the identification is convenient for unified management. Further, after determining the first identifier, the server may store the association relationship between the first identifier, the electronic device 1 and the account 1, that is, update the table 3.
  • the server configures the first identification for the first fingerprint when none of the multiple electronic devices stores the first fingerprint.
  • S511 The server sends the first identifier to the electronic device 1, and accordingly, the electronic device 1 receives the first identifier.
  • the server may send third information to the electronic device 1, where the third information includes the first identifier.
  • the server may configure the first identification for the first fingerprint, and send the first identification to the electronic device 1 .
  • the electronic device 1 may store the association relationship between the account A, the first identification and the first fingerprint feature, that is, update the table 2.
  • the electronic device 1 successfully records the first fingerprint.
  • the display interface of the electronic device 1 displays prompt information of successful fingerprint entry, such as text or picture, or voice (or animation) playback of the prompt information of successful fingerprint entry.
  • the electronic device 1 before the electronic device 1 displays the fingerprint entry interface, that is, before S502, the electronic device 1 can also provide a verification method for the user to choose. Or different account fingerprint verification, etc.
  • the electronic device 1 may display a verification method selection interface. As shown in FIG. 7 , the verification method selection interface may include a single fingerprint verification option, a same account multi-fingerprint verification option, and a different account multi-fingerprint verification option.
  • the user can select the single-fingerprint verification option, and further select or enter account A, then the newly created fingerprint will be stored under account A, that is, the newly created fingerprint is stored with account A as an index.
  • the user can select the option of multi-fingerprint verification on the same account, and further select or input account A and the number of newly created multiple fingerprints, then the newly created multiple fingerprints will be stored under account A, that is, the newly created multiple fingerprints are indexed with account A to store.
  • the user can select the multi-fingerprint verification option for different accounts, and further select or input account A, the number of newly created fingerprints under account A, account B, and the number of newly created fingerprints under account B, then the newly created fingerprints will be stored in the account respectively. Under account A and account B, that is, the newly created fingerprints are stored with account A and account B as indexes respectively.
  • the single fingerprint verification may refer to one fingerprint used to unlock the electronic device 1 .
  • fingerprint 1 is used to unlock electronic device 1.
  • the electronic device 1 is successfully unlocked; otherwise, the electronic device 1 fails to be unlocked.
  • the multi-fingerprint verification for the same account may refer to multiple fingerprints used to unlock the electronic device 1, and the multiple fingerprints are stored with the same account as an index. For example, fingerprint 1 and fingerprint 2 are used to unlock electronic device 1, and fingerprint 1 and fingerprint 2 are stored under account A. In the case where the screen of the electronic device 1 is locked, if the user inputs fingerprint 1 and fingerprint 2 to the electronic device 1, the electronic device 1 is successfully unlocked; otherwise, the electronic device 1 fails to be unlocked.
  • the multi-fingerprint verification of different accounts may refer to multiple fingerprints used to unlock the electronic device 1, and the multiple fingerprints are stored with different account numbers as indexes.
  • fingerprint 1 and fingerprint 2 are used to unlock the electronic device
  • fingerprint 1 is stored under account A
  • fingerprint 2 is stored under account B.
  • the electronic device 1 logs in to find the account A, and the screen is locked
  • the electronic device 1 successfully verifies the fingerprint 1, and sends a remote verification request to the electronic device 2 through the server , to request the electronic device 2 to verify the fingerprint 2 , wherein the electronic device 2 logs into the account B and stores the fingerprint 2 .
  • the verification of the electronic device 2 is successful, the unlocking of the electronic device 1 is successful; otherwise, the unlocking of the electronic device 1 fails.
  • the electronic device 1 may acquire at least two fingerprint features. For example, the user can click the verification method to select the multi-fingerprint verification option of the same account in the interface (as shown in FIG. 7 ), and enter the fingerprint input interface of the multi-fingerprint verification of the same account. Taking the unlocking fingerprints of the electronic device 1 as fingerprint 1 and fingerprint 2 as an example, the user can place two fingers in the two fingerprint entry areas 81 at the same time or back and forth, or different users touch the two fingerprint entry areas 81 respectively, then , the electronic device 1 can obtain the fingerprint 1 and the fingerprint 2 under the account A, as shown in FIG. 8 .
  • the electronic device 1 can complete the entry of the fingerprint 1 and the fingerprint 2 according to the process shown in S504 to S511 in FIG. 5 . It can be understood that the user can complete the entry of multiple fingerprints in one interface, or can complete the entry of multiple fingerprints in multiple interfaces. For example, the user can complete the entry of multiple fingerprints one after another in the fingerprint entry interface as shown in FIG. 6 .
  • the electronic device 1 may acquire at least one fingerprint feature under each of the at least two accounts. For example, the user can click the verification method to select the multi-fingerprint verification option of the same account in the interface (as shown in FIG. 7 ), and enter the fingerprint input interface of the multi-fingerprint verification of different accounts. Taking the unlocking fingerprints of the electronic device 1 as the fingerprint 1 under account A and the fingerprint 2 under account B as an example, the user can place two fingers in the two fingerprint entry areas 91 at the same time or back and forth, or different users touch If there are two fingerprint entry areas 91, the electronic device 1 can collect fingerprint 1 under account A and fingerprint 2 under account B, as shown in FIG. 9 .
  • the electronic device 1 After the electronic device 1 obtains the fingerprint 1 and the fingerprint 2, it can complete the entry of the fingerprint 1 and the fingerprint 2 according to the process shown in S504 to S511 in FIG. B is stored for the index. It can be understood that the user can complete the input of multiple fingerprints in one interface, or can complete the input of multiple fingerprints in multiple interfaces. For example, the user can complete the entry of multiple fingerprints one after another in the fingerprint entry interface as shown in FIG. 6 .
  • FIG. 10 is a schematic flowchart of a fingerprint verification method provided by an embodiment of the present application.
  • the method can be applied to the application scenario shown in FIG. 2 , for example, the first electronic device is the electronic device 2 in FIG. 2 , the server is the server in FIG. 2 , and the second electronic device is the electronic device 1 in FIG. 2 .
  • the fingerprint verification method provided by the embodiment of the present application is described below by taking the application scenario shown in FIG. 2 as an example, and the process of the method is as follows.
  • the electronic device 1 displays a lock screen interface.
  • the second user lights the screen of the electronic device 1, and the electronic device 1 displays a lock screen interface.
  • S1002 The electronic device 1 fails to unlock the lock screen interface.
  • the electronic device 1 may display the second fingerprint verification interface, detect a third operation (such as a touch operation) of the second user on the second fingerprint verification interface, and in response to the third operation, obtain the fourth fingerprint verification interface. Fingerprint, the fourth fingerprint is matched with the first fingerprint, and the matching fails, that is, the electronic device 1 fails to unlock the lock screen interface.
  • a third operation such as a touch operation
  • the unlocking fingerprint of electronic device 1 is fingerprint 1 .
  • the electronic device 1 displays a second fingerprint verification interface, and the second fingerprint verification interface may include a fingerprint verification area 111 , as shown in FIG. 11 .
  • the second user can touch the fingerprint verification area 111.
  • the electronic device 1 obtains the fingerprint 2.
  • the electronic device 1 matches the fingerprint feature 1 with the fingerprint feature 2.
  • the electronic device 1 Failed to unlock the lock screen.
  • the fingerprint feature 1 may be the feature of the fingerprint 1, and the fingerprint feature 2 may be the feature of the fingerprint 2.
  • the unlocking fingerprints of the electronic device 1 are the fingerprint 1 and the fingerprint 2 under the account A.
  • the electronic device 1 displays a second fingerprint verification interface, and the second fingerprint verification interface may include two fingerprint verification areas 121 , as shown in FIG. 12 .
  • the second user can input the fingerprint 3 to the electronic device 1 by touching the fingerprint verification area 121 , and further, the electronic device 1 can match the fingerprint feature 3 with the fingerprint feature 1 and the fingerprint feature 2 one by one. Since the unlocking fingerprints of the electronic device 1 are fingerprint 1 and fingerprint 2, and the electronic device 1 has acquired one fingerprint, the electronic device 1 fails to unlock the lock screen interface regardless of whether the matching is successful or not.
  • the second user can input the fingerprint 3 and the fingerprint 4 to the electronic device 1 by touching the fingerprint verification area 121.
  • the electronic device 1 can pair the fingerprint feature 3 and the fingerprint feature one by one according to the fingerprint feature 1 and the fingerprint feature 2. 4 Match one by one.
  • the electronic device 1 fails to unlock the lock screen interface.
  • fingerprint feature 1 does not match fingerprint feature 4
  • fingerprint feature 2 matches or does not match fingerprint feature 3
  • the electronic device 1 fails to unlock the lock screen interface.
  • the electronic device 1 fails to unlock the lock screen interface.
  • fingerprint feature 2 does not match fingerprint feature 4
  • fingerprint feature 1 matches or does not match fingerprint feature 3
  • the electronic device 1 fails to unlock the lock screen interface.
  • fingerprint feature 2 does not match fingerprint feature 4
  • fingerprint feature 1 matches or does not match fingerprint feature 3
  • the electronic device 1 fails to unlock the lock screen interface.
  • the unlocking fingerprints of the electronic device 1 are the fingerprint 1 under the account A and the fingerprint 2 under the account B.
  • the electronic device 1 displays a second fingerprint verification interface, and the second fingerprint verification interface may be as shown in FIG. 12 .
  • the second user can input the fingerprint 3 to the electronic device 1 by touching the fingerprint verification area 121 , and further, the electronic device 1 matches the fingerprint feature 1 with the fingerprint feature 3 .
  • the electronic device 1 Since the unlocking fingerprints of the electronic device 1 are the fingerprint 1 under the account A and the fingerprint 2 under the account B, and the electronic device 1 is currently logged in to the account A and has acquired a fingerprint, therefore, regardless of whether the matching is successful or not, the electronic device 1 locks the lock. Unlocking the screen interface failed. For another example, when the electronic device 1 logs into account A, the second user can input the fingerprint 3 and the fingerprint 4 to the electronic device 1 by touching the fingerprint verification area 121. Further, the electronic device 1 associates the fingerprint feature 1 with the fingerprint feature 3 and the fingerprint feature 4 Match one by one. Since the unlocking fingerprints of electronic device 1 are fingerprint 1 under account A and fingerprint 2 under account B, and electronic device 1 is currently logged in to account A, electronic device 1 fails to unlock the lock screen interface regardless of whether the matching is successful or not.
  • the second fingerprint verification interface may further include a remote fingerprint verification option 132, as shown in FIG. 13 .
  • the second user can click the remote fingerprint verification option 132 in the second fingerprint verification interface, and in response, the electronic device 1 fails to unlock the lock screen interface by default, and directly sends the first information to the server.
  • the second user can choose to touch the fingerprint verification area 131 for direct verification, or can choose to click the remote fingerprint verification option 132 for remote verification, which has high flexibility and can improve user experience.
  • S1003 The electronic device 1 sends the first information to the server, and accordingly, the server receives the first information.
  • the first information may include a first identification
  • the first identification is the identification of the first fingerprint
  • the first fingerprint is used to unlock the electronic device 1.
  • the first information may further include first account information, where the first account information is used to indicate an account associated with the first fingerprint.
  • the first fingerprint is stored with account A as an index, and the first account information may be account A.
  • the first fingerprint is stored with account B as an index, and the first account information is account B.
  • the embodiments of the present application are described by taking the first fingerprint for unlocking the electronic device 1 as an example.
  • the first information may include the identification of at least one fingerprint that has not been successfully verified among the multiple fingerprints.
  • S1004 The server determines the electronic device 2.
  • the server may determine one or more electronic devices that store the first identification. For example, the server may determine one or more electronic devices that store the first fingerprint under account A according to the association relationship between the account, the electronic device, and the identification of the fingerprint, and select an electronic device from the one or more electronic devices . For example, the server may determine one or more electronic devices through the lookup table 3, any one of the one or more electronic devices is logged in to account A, and the first fingerprint is stored under account A. Further, the server may select the electronic device 2 from the one or more electronic devices. For example, the server may determine the electronic device 2 from the one or more electronic devices according to at least one of state (eg, working state, standby state, or shutdown state, etc.), distance, or communication quality. For example, the electronic device 2 may be an electronic device with the best communication quality and in a working state among the one or more electronic devices.
  • state eg, working state, standby state, or shutdown state, etc.
  • the electronic device 2 may be an electronic device with the best communication quality and in a working state
  • S1005 The server sends the first information to the electronic device 2, and accordingly, the electronic device 2 receives the first information.
  • the server may send the first information to at least one electronic device, where the at least one electronic device includes the electronic device 2, and any one of the at least one electronic device has entered the first fingerprint under the account A.
  • the fingerprints to be verified include fingerprint 1 and fingerprint 2
  • the server can send the first information including the identification of fingerprint 1 to the electronic device 2, and send the first information including the identification of fingerprint 2.
  • the electronic device 3 is given, wherein the electronic device 2 is logged into the account A, and the fingerprint 1 is recorded under the account A, and the electronic device 3 is logged in the account A, and the fingerprint 2 is recorded under the account A.
  • the fingerprints to be verified include fingerprint 1 under account A and fingerprint 2 under account B
  • the server can send the first information including the identification of fingerprint 1 to electronic device 2, and will include fingerprint 2.
  • the first information of the identification of 2 is sent to the electronic device 4, wherein the electronic device 2 has logged in the account A, and the fingerprint 1 is recorded under the account A, and the electronic device 4 is logged in the account B, and the fingerprint 3 is entered under the account B. .
  • S1006 The electronic device 2 displays the first fingerprint verification interface.
  • the electronic device 2 may prompt the user to input the first fingerprint by means of text, voice, vibration, video or image, and display the first fingerprint verification interface.
  • the electronic device 2 pops up a remote fingerprint verification interface (ie, the first fingerprint verification interface), which may include a fingerprint verification area 141 , as shown in FIG. 14 .
  • the remote fingerprint verification interface can also include a reject option 142. After the user clicks the reject option 142, the remote fingerprint verification interface can be closed, and a verification failure message can be sent to the electronic device 1 through the server, so that the electronic device 1 can be controlled. in the lock screen state.
  • S1007 The electronic device 2 detects the first operation performed by the first user on the first fingerprint verification interface.
  • the first user performs the first operation on the first fingerprint verification interface.
  • the first user touches the fingerprint verification area 141 on the first fingerprint verification interface.
  • the electronic device 2 detects the first operation.
  • S1008 The electronic device 2 acquires a second fingerprint.
  • the electronic device 2 After detecting the first operation performed by the first user on the first fingerprint verification interface, the electronic device 2 acquires the second fingerprint. Further, the electronic device 2 can extract the features of the second fingerprint to obtain the second fingerprint features.
  • the electronic device 2 matches the second fingerprint with the first fingerprint to obtain a first matching result.
  • the electronic device 2 obtains the first fingerprint feature corresponding to the first identification according to the account maintained by the electronic device 2, the association between the fingerprint identification and the fingerprint feature, for example, the electronic device 2 determines through the lookup table 2 that the first identification corresponds to The first fingerprint feature of . Further, the electronic device 2 may match the first fingerprint feature with the second fingerprint feature to obtain a first matching result, and the first matching result may be used to indicate whether the matching is successful or the matching fails.
  • S1010 The electronic device 2 sends the first matching result to the server, and correspondingly, the server receives the first matching result.
  • S1011 The server sends the first matching result to the electronic device 1, and accordingly, the electronic device 1 receives the first matching result.
  • the server if the server sends the first information to multiple electronic devices, the server will receive matching results from multiple electronic devices. For example, both the electronic device 2 and the electronic device 3 are logged into the account A, and the fingerprint 1 is entered under the account A.
  • the server may send the first information including the identification of the fingerprint 1 to the electronic device 2 and the electronic device 3.
  • the server may receive the matching result from the electronic device 2 and the matching result from the electronic device 3 .
  • the server may discard the matching result of the electronic device 2 and send the matching result of the electronic device 3 to the electronic device 1, or, The server may discard the matching result of the electronic device 3 and send the matching result of the electronic device 2 to the electronic device 1, which is not limited in this embodiment of the present application.
  • the electronic device 2 and the electronic device 3 are logged into different accounts.
  • the server sends the first information including the identification of the fingerprint 1 to the electronic device 2, and sends the first information including the identification of the fingerprint 2 to the electronic device 3.
  • the server may receive the matching result from the electronic device 2 and the matching result from the electronic device 3 . In this case, the server may send both the matching result of the electronic device 2 and the matching result of the electronic device 3 to the electronic device 1 .
  • the server sends the first information including the identification of the fingerprint 1 to the electronic device 2, and sends the first information including the identification of the fingerprint 3 to the electronic device 4.
  • the server may receive the matching result from the electronic device 2 and the matching result from the electronic device 4 . In this case, the server may send both the matching result of the electronic device 2 and the matching result of the electronic device 4 to the electronic device 1 .
  • the electronic device 2 and the electronic device 4 are logged into different accounts.
  • the electronic device 1 may display the first matching result, for example, displaying the first matching result in the form of voice, picture, video, or text.
  • the electronic device 1 may also not display the first matching result, that is, after the electronic device 1 determines that the verification is successful, it directly displays the unlocked screen, that is, the content shown in step S1012 is executed.
  • the server sends the matching result of the electronic device 2 and the matching result of the electronic device 3 to the electronic device 1, and the electronic device 1 can be based on the matching result of the electronic device 2 and the electronic device 3.
  • the matching result determines the screen unlocking failure or success.
  • electronic device 1 displays the unlocked screen, that is, the screen of electronic device 1 is unlocked successfully;
  • the screen of the electronic device 1 fails to unlock; in the case that the matching result of the electronic device 3 is a matching failure, and the matching result of the electronic device 2 is that the matching is successful.
  • the screen unlocking of the electronic device 1 fails; in the case that the matching result of the electronic device 2 is a matching failure, and the matching result of the electronic device 3 is a matching failure, the screen unlocking of the electronic device 1 fails.
  • the server sends the matching result of the electronic device 2 and the matching result of the electronic device 4 to the electronic device 1, and the electronic device 1 can be based on the matching result of the electronic device 2 and the electronic device 4.
  • the matching result determines the screen unlocking failure or success.
  • the electronic device 1 displays the unlocked screen, that is, the screen of the electronic device 1 is successfully unlocked;
  • the result is that the matching fails, and the matching result of the electronic device 4 is that the matching is successful, and the screen of the electronic device 1 fails to unlock;
  • the screen unlocking of the electronic device 1 fails; in the case that the matching result of the electronic device 2 is a matching failure, and the matching result of the electronic device 4 is a matching failure, the screen unlocking of the electronic device 1 fails.
  • the electronic device 1 and the electronic device 2 may authorize each other through the server. After authorization, the electronic device 1 and the electronic device 2 can perform remote fingerprint verification with each other. For example, the electronic device 1 can remotely request the electronic device 2 to perform fingerprint matching, and the electronic device 2 can also remotely request the fingerprint matching of the electronic device 1 . For example, during the authorization process, the electronic device 1 can determine the identity of the fingerprints entered by the electronic device 2 under each account, and the electronic device 2 can also determine the identity of the fingerprints entered by the electronic device 1 under each account.
  • FIG. 15 shows a schematic flowchart of a fingerprint verification method provided by an embodiment of the present application.
  • the method can be applied to the application scenario shown in FIG. 2 , for example, the first electronic device is the electronic device 2 in FIG. 2 , the server is the server in FIG. 2 , and the second electronic device is the electronic device 1 in FIG. 2 .
  • This method is used for remote verification of one or more fingerprints under the same account.
  • the same account means that the first electronic device and the second electronic device log into the same account.
  • the account may refer to a user account, such as a user account of a mobile phone, or an APP user account.
  • An account can be logged in on multiple electronic devices at the same time, and multiple electronic devices under the same account can share account information of the account, such as account number, account password, avatar, or usage data.
  • the electronic device 1 includes a fingerprint verification module 1 , a fingerprint feature and ID synchronization module 1 , a fingerprint collection and processing module 1 and a local fingerprint database 1 .
  • the server includes a fingerprint verification and management module, a fingerprint and ID synchronization management module, an account management and a device selection module.
  • the electronic device 2 includes a fingerprint verification module 2 , a fingerprint feature and ID synchronization module 2 , a fingerprint collection and processing module 2 and a local fingerprint database 2 .
  • each module in FIG. 15 The functions of each module in FIG. 15 are briefly described below by taking the electronic device 1 as the device to be unlocked and the unlocking fingerprint of the electronic device 1 as the fingerprint 1 as an example.
  • the fingerprint verification module 1 is configured to receive the fingerprint feature 2 from the fingerprint collection and processing module 1, and match the fingerprint feature 2 with the fingerprint feature 1. If the match is successful, the electronic device 1 is successfully unlocked, and if the match fails, the electronic device 1 fails to be unlocked.
  • the fingerprint feature 2 is the feature of the fingerprint 2
  • the fingerprint 2 is the fingerprint collected by the fingerprint collection and processing module 1 in the fingerprint verification interface of the electronic device 1 .
  • the fingerprint verification module 1 may send the first identification to the server.
  • the fingerprint verification module 1 can implement the contents shown in S504 and S1002 in the above embodiment.
  • the fingerprint verification module 2 is used to identify the verification request from the server; receive the fingerprint feature 3 from the fingerprint collection and processing module 2; and match the fingerprint feature 3 with the fingerprint feature 1, and send the matching result to the server. If the matching result indicates that the matching is successful, the electronic device 1 is successfully unlocked, and if the matching result indicates that the matching fails, the electronic device 1 fails to be unlocked.
  • the fingerprint feature 3 is a feature of the fingerprint 3
  • the fingerprint 3 is a fingerprint collected by the fingerprint collection and processing module 2 in the fingerprint verification interface of the electronic device 1 .
  • the fingerprint verification module 2 can implement the contents shown in S508 and S1009 in the above embodiment.
  • the fingerprint feature and ID synchronization module 1 is used to maintain the association relationship between the fingerprint feature and the identification of the fingerprint in the electronic device 1 .
  • the identity corresponding to fingerprint feature 1 is identity 1.
  • the fingerprint feature and ID synchronization module 1 is also used to maintain the association relationship between the account in the electronic device 1, the fingerprint feature and the identification of the fingerprint.
  • fingerprint feature 1 and identity 1 correspond to account A.
  • the fingerprint feature and ID synchronization module 2 is used to maintain the association relationship between the fingerprint feature and the identification of the fingerprint in the electronic device 2 .
  • the fingerprint feature and ID synchronization module 2 is also used to maintain the relationship between the account in the electronic device 2, the fingerprint feature and the identification of the fingerprint, such as determining the first fingerprint feature according to the first identification.
  • the fingerprint collection and processing module 1 is used to detect the touch operation of the second user in the second fingerprint verification interface or the fingerprint entry interface, respond to the touch operation of the second user, obtain the fingerprint input by the second user, and extract The fingerprint characteristics of this fingerprint.
  • the fingerprint collection and processing module 1 can implement the contents shown in S503 and S1002 in the above embodiment.
  • the fingerprint collection and processing module 2 is used to detect the touch operation of the first user on the first fingerprint verification interface, respond to the touch operation of the first user, obtain the fingerprint input by the first user, and extract the fingerprint features of the fingerprint .
  • the fingerprint collection and processing module 2 can implement the contents shown in S1007 and S1008 in the above embodiment.
  • the local fingerprint database 1 is used to store one or more fingerprint features acquired by the fingerprint collection and processing module 1 . Part or all of the one or more fingerprint features in the local fingerprint database 1 can be used as unlocking fingerprints of the electronic device 1 .
  • the local fingerprint database 2 is used to store one or more fingerprint features acquired by the fingerprint collection and processing module 2 . Some or all of the one or more fingerprint features in the local fingerprint database 2 can be used as unlocking fingerprints of the electronic device 2 . In this embodiment of the present application, some or all of the fingerprint features of the local fingerprint database 2 can be used for unlocking and verification of the electronic device 1 . Part or all of the fingerprint features of the local fingerprint database 1 and part or all of the fingerprint features of the local fingerprint database 2 may be the same. For example, the local fingerprint database 1 or the local fingerprint database 2 stores the association relationship between the account number, the identification of the fingerprint and the fingerprint feature, as shown in Table 2.
  • the fingerprint verification management module is configured to receive a verification request message from the electronic device 1, where the verification request message is a request message for requesting remote fingerprint verification.
  • the fingerprint and ID synchronization management module is used to maintain the relationship between the electronic device and the identification, and assign the identification to the fingerprint entered by the electronic device. For example, electronic device 1 corresponds to ID 1, electronic device 2 corresponds to ID 1, and electronic device 2 corresponds to ID 2.
  • the account management module is used to maintain the association relationship between the electronic device and the account, for example, the corresponding relationship between the electronic device 1 and the account that the electronic device 1 used to log in and/or currently log in, as shown in Table 1.
  • the fingerprint and ID synchronization management module and the account management module can jointly maintain the association relationship between the electronic device, the account number and the identification of the fingerprint, as shown in Table 3.
  • the device selection module is used to select an electronic device from a plurality of electronic devices served by the server to perform remote fingerprint verification, so as to unlock the electronic device 1 .
  • the device selection module may select one electronic device from multiple electronic devices to perform remote fingerprint verification according to the state of the electronic device (eg, standby state or working state), communication quality, and the like.
  • the device selection module may be used to implement the contents shown in S506 and S1004 in the above embodiment.
  • the manner of dividing the modules of the electronic device in the embodiment of the present application is only an example, which is not limited in the embodiment of the present application.
  • the electronic device 1 may further include a display module for displaying a fingerprint verification interface, or a fingerprint entry interface, or a screen lock interface.
  • the electronic device 1 can also be divided into a fingerprint verification module and a storage module.
  • the fingerprint verification module can be used to implement the functions implemented by the fingerprint verification module 1 , the fingerprint feature and ID synchronization module 1 , and the fingerprint collection and processing module 1
  • the storage module can be used to implement the functions implemented by the local fingerprint database 1 .
  • the electronic device may also have other module division manners.
  • the embodiments of the present application do not limit the names of the modules.
  • the names of the fingerprint verification module 1, the fingerprint feature and ID synchronization module 1, the fingerprint collection and processing module 1, and the local fingerprint database 1 described in the embodiments of the present application are only An example.
  • the manner of dividing the modules of the server in the embodiment of the present application is only an example, which is not limited in the embodiment of the present application.
  • the server can also be divided into a fingerprint verification module and a transceiver module.
  • the fingerprint verification module can be used to realize part or all of the functions realized by the fingerprint verification management module, the fingerprint and ID synchronization management module, the account management module and the device selection module, and the transceiver module is used to realize the communication with the electronic device.
  • the server may also have other module division methods.
  • the embodiments of the present application do not limit the names of the modules, and the names of the fingerprint verification management module, the fingerprint and ID synchronization management module, the account management module, and the device selection module described in the embodiments of the present application are just examples.
  • FIG. 16 is a schematic flowchart of a fingerprint entry method provided by an embodiment of the present application.
  • the fingerprint entry is described with reference to FIG. 15 .
  • the flow of the method can be as follows.
  • account A may be a user account of an electronic device, and the account may be logged on multiple electronic devices at the same time.
  • S1602 The user initiates fingerprint entry, and the fingerprint 1 is entered into the electronic device 1 .
  • the user can input the fingerprint 1 to the electronic device 1 by touching the fingerprint entry area in the fingerprint entry interface, and correspondingly, the fingerprint collection and processing module 1 of the electronic device 1 acquires the fingerprint 1 .
  • the fingerprint collection and processing module 1 extracts the fingerprint feature of the fingerprint 1 (referred to as fingerprint feature 1).
  • the fingerprint collection and processing module 1 sends the fingerprint feature 1 to the fingerprint verification module 1 .
  • the fingerprint verification module 1 fails to match the fingerprint feature 1 with all or part of the local fingerprint feature 1.
  • the fingerprint verification module 1 of the electronic device 1 may match the fingerprint feature 1 with all or part of the fingerprint features in the local fingerprint database 1 one by one. If the fingerprint feature 1 matches all or part of the local fingerprint database 1 successfully, the fingerprint verification module 1 of the electronic device 1 can determine that the fingerprint 1 has been entered under the local account A, and prompt the user that the fingerprint 1 is successfully entered. That is, the content shown in S1615 is executed; otherwise, the fingerprint verification module 1 of the electronic device 1 can determine that the fingerprint 1 is not recorded under the local account A, that is, the content shown in S1605 is executed.
  • the fingerprint verification module 1 encrypts the fingerprint feature 1 to obtain the second information.
  • the fingerprint verification module 1 of the electronic device 1 sends the second information to the server, and correspondingly, the fingerprint verification management module of the server receives the second information.
  • the fingerprint verification management module of the server determines at least one electronic device with a fingerprint recorded thereon.
  • the fingerprint verification management module of the server may query Table 3 to determine at least one electronic device with a fingerprint recorded under account A.
  • the at least one electronic device includes electronic device 2 .
  • Table 3 may be jointly maintained by the account management module and the fingerprint and ID synchronization management module.
  • the fingerprint verification management module of the server sends the second information to the electronic device 2, and accordingly, the fingerprint verification module 2 in the electronic device 2 receives the second information.
  • the fingerprint verification module 2 determines the fingerprint feature 1 according to the second information.
  • the fingerprint verification module 2 can decrypt the second information to obtain the fingerprint feature 1 .
  • the fingerprint verification module 2 matches the fingerprint feature under the local account A with the fingerprint feature 1 to obtain third information.
  • the fingerprint verification module 2 of the electronic device 2 can match the fingerprint feature 1 with at least one fingerprint feature stored under the local account A one by one, if the fingerprint feature 1 matches one of the at least one fingerprint feature stored under the local account A, Then the third information includes the first identifier, otherwise, the third information is used to indicate that the electronic device 2 does not store the fingerprint 1 .
  • the fingerprint verification module 2 of the electronic device 2 sends the third information to the server, and correspondingly, the fingerprint verification management module of the server receives the third information.
  • the third information includes the first identifier, execute the content shown in S1614; otherwise, execute the content shown in S1613.
  • S1613 The fingerprint verification management module of the server determines the identity of the fingerprint 1.
  • the fingerprint verification module of the server may determine the identification of fingerprint 1 according to the identification of the existing fingerprint under account A in Table 3, so that the identification of fingerprint 1 is unique under account A.
  • S1614 The fingerprint verification management module of the server sends the first identifier to the electronic device 1, and correspondingly, the fingerprint verification module 2 of the electronic device 1 receives the first identifier.
  • the fingerprint verification module 2 of the electronic device 1 may store the association between the account A, the first identifier, and the fingerprint feature 1 in the local fingerprint database 1 .
  • the electronic device 1 may prompt the user that the fingerprint 1 is successfully entered by means of text, picture, voice or video.
  • FIG. 17 shows a schematic flowchart of a fingerprint verification method provided by an embodiment of the present application. This embodiment is used to describe the verification of multiple fingerprints on the same account. As shown in FIG. 17 , the flow of the method can be as follows.
  • the unlocking fingerprints of the electronic device 1 are fingerprint 1 and fingerprint 2 .
  • user 1 can start electronic device 1, and after the boot animation of electronic device 1 is displayed, a second fingerprint verification interface is displayed, prompting user 1 to input a fingerprint, user 1 can touch the fingerprint verification area in the second fingerprint verification interface, The electronic device 1 inputs the fingerprint 3 .
  • the fingerprint collection and processing module 1 of the electronic device 1 extracts the fingerprint feature of the fingerprint 3 (ie, the fingerprint feature 3).
  • the fingerprint collection and processing module 1 sends the fingerprint feature 3 to the fingerprint verification module 1 of the electronic device 1 , and accordingly, the fingerprint verification module 1 of the electronic device 1 receives the fingerprint feature 3 .
  • S1705 The fingerprint verification module 1 matches the fingerprint 3, and the matching is successful.
  • the fingerprint verification module 1 can match the fingerprint feature 2 with the fingerprint feature 3, and the matching is successful.
  • the fingerprint verification module 1 determines the identity of the fingerprint 1 (ie, the first identity).
  • the fingerprint verification module 1 may determine the first identification through the correspondence between the fingerprint features maintained by the local fingerprint database 1 and the identification of the fingerprint.
  • the fingerprint verification module 1 sends the first information to the server, and accordingly, the fingerprint verification module of the server receives the first information.
  • the first information may include a first identifier.
  • the first information further includes account A.
  • S1708 The fingerprint verification management module of the server determines the electronic device 2 according to the first identifier.
  • the fingerprint verification management module of the server can determine the electronic device 2 by the identification of the fingerprint, the account number, and the corresponding relationship of the electronic device.
  • the fingerprint verification management module of the server sends the first information to the electronic device 2, and correspondingly, the fingerprint verification module 2 of the electronic device 2 receives the first information.
  • the first information may include a first identifier.
  • the first information further includes account A. 1711:
  • the fingerprint verification module of the electronic device 2 prompts the user B to input a fingerprint.
  • S1710 The electronic device 2 displays the first fingerprint verification interface.
  • the user B can input the fingerprint 4 to the electronic device 2 by touching the fingerprint verification area in the remote fingerprint verification interface.
  • the fingerprint collection and processing module 2 of the electronic device 2 extracts the fingerprint feature of the fingerprint 4 (referred to as fingerprint feature 4).
  • the fingerprint collection and processing module 2 of the electronic device 2 sends the fingerprint feature 4 to the fingerprint verification module 2 of the electronic device 2 .
  • the fingerprint verification module 2 of the electronic device 2 matches the fingerprint feature 2 with the fingerprint feature 4 to obtain a first matching result.
  • the first matching result is used to indicate whether the matching succeeds or fails.
  • the fingerprint verification module 2 of the electronic device 2 sends the first matching result to the server, and correspondingly, the fingerprint verification management module of the server receives the first matching result.
  • S1716 The fingerprint verification management module of the server sends the first matching result to the electronic device 1, and accordingly, the electronic device 1 receives the first matching result.
  • the fingerprint verification module 1 of the electronic device 1 can display the unlocked interface to the user 1 through the display interface; if the first matching result indicates that the matching fails, the fingerprint verification module 1 of the electronic device 1 The fingerprint verification module can display the verification failure information to the user 1 through the display interface.
  • the electronic device 1 completes the remote fingerprint verification. It should be noted that, for the specific implementation process of each step in FIG. 17 , reference may be made to the specific implementation process of FIG. 10 in the foregoing embodiment, and details are not repeated here.
  • FIG. 18 shows a schematic flowchart of a fingerprint verification method provided by an embodiment of the present application.
  • the method can be applied to the application scenario shown in FIG. 2 , for example, the first electronic device is the electronic device 2 in FIG. 2 , the server is the server in FIG. 2 , and the second electronic device is the electronic device 1 in FIG. 2 .
  • This method is used for remote verification of multiple fingerprints under different accounts. Different accounts refer to the fact that the first electronic device and the second electronic device log into different accounts.
  • the account may refer to a user account, such as a user account of a mobile phone, or an APP user account.
  • the electronic device 1 includes a fingerprint verification module 1 , an account management module 1 , a fingerprint collection and processing module 1 , and a local fingerprint database 1 .
  • the server includes a fingerprint verification and management module, an account management 3 and a device selection module.
  • the electronic device 2 includes a fingerprint verification module 2 , an account management module 2 , a fingerprint collection and processing module 2 and a local fingerprint database 2 .
  • the specific functions of the fingerprint verification module 1, the fingerprint acquisition and processing module 1 and the local fingerprint database 1 of the electronic device 1 can be referred to the fingerprint verification module 1, the fingerprint acquisition and processing module 1 and the local fingerprint database 1 in FIG. 15 respectively. No longer.
  • the fingerprint verification and management module and the device selection module of the server reference may be made to the fingerprint verification and management module and the device selection module in FIG. 15 respectively, which will not be repeated here.
  • the specific functions of the fingerprint verification module 2, the fingerprint acquisition and processing module 2 and the local fingerprint database 2 of the electronic device 2 can be referred to the fingerprint verification module 2, the fingerprint acquisition and processing module 2 and the local fingerprint database 2 in FIG. 15 respectively, and will not be repeated here. Repeat. The difference is:
  • the account management module 1 can be used to support abnormal multi-fingerprint verification of the electronic device 1 .
  • the account management module 1 includes multiple accounts, and the electronic device 1 can record fingerprints under the multiple accounts.
  • the electronic device 1 may record fingerprints under different accounts, so that the unlocking fingerprints of the electronic device 1 are fingerprints under different accounts.
  • the unlocking fingerprints of the electronic device 1 are the fingerprint 1 under the account A and the fingerprint 2 under the account B, and the electronic device 1 logs in the account A.
  • the fingerprint collection and processing module 1 acquires the fingerprint 3 and sends the features of the fingerprint 3 to the fingerprint verification module 1 .
  • the fingerprint verification module 1 verifies the fingerprint 3, and when the verification is successful, the fingerprint verification module 1 determines the fingerprint to be verified and the account where the fingerprint to be verified is located through the account management module 1, and obtains first information, which includes account B. and fingerprint 1 identification. The fingerprint verification module 1 sends the first information to the server to request remote fingerprint verification.
  • the account management module 3 can be used to maintain the association relationship between the electronic device and the account, as shown in Table 1.
  • the account management module 2 can be used to support abnormal multi-fingerprint verification of the electronic device 2 .
  • the account management module 2 includes multiple accounts, and the electronic device 2 can record fingerprints in the multiple accounts.
  • the electronic device 1 and the electronic device 2 are mutually authorized through the server, so that the electronic device 1 and the electronic device 2 under different accounts can respond to fingerprint verification under the different accounts.
  • the above-mentioned embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server, or data center by wire (eg, coaxial cable, optical fiber, digital subscriber line) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media (eg, solid state drives), and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Biomedical Technology (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)

Abstract

一种指纹验证方法、电子设备与服务器,用以实现远程指纹验证。该方法中,第一电子设备接收来自服务器的第一信息,第一信息中包括第一标识,第一标识为第一指纹的标识;第一电子设备显示指纹验证界面,并检测到第一用户在第一指纹验证界面上进行的第一操作;第一电子设备响应于第一操作,获取第二指纹;第一电子设备将第二指纹与第一指纹进行匹配;第一电子设备向服务器发送第一匹配结果,第一匹配结果用于指示匹配成功或匹配失败,且第一匹配结果用于与第一标识关联的电子设备的解锁。

Description

一种指纹验证方法、电子设备与服务器
相关申请的交叉引用
本申请要求在2020年10月31日提交中国专利局、申请号为202011199074.4、申请名称为“一种指纹验证方法、电子设备与服务器”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及电子技术领域,尤其涉及一种指纹验证方法、电子设备与服务器。
背景技术
指纹包括许多特征点,这些特征点提供了指纹唯一性的确认信息,是用户区分于其它用户的生物特征。指纹验证技术具有高识别性、高安全性的特点,被广泛应用于电子设备的用户身份验证,例如设备解锁验证、支付验证、或应用程序开启验证等。
目前的指纹验证流程为:步骤1,电子设备录入指纹1,该指纹1用于电子设备的解锁,如用户可以通过触摸的指纹录入区域,向电子设备输入指纹1;步骤2,电子设备提取指纹1的指纹特征(记为指纹特征1)并存储在本地;步骤3,电子设备显示指纹验证界面,并检测到用户在指纹验证界面上进行的触碰操作,获取指纹2,并将指纹特征1与指纹2的指纹特征进行匹配,得到验证结果;步骤4,在验证结果指示验证成功的情况下,电子设备成功解锁,在验证结果指示验证失败情况下,电子设备解锁失败,如图1所示。
当前的指纹验证中需要用户触碰电子设备的指纹验证区域,也即是用户需要近距离接触电子设备,无法远程控制电子设备,如家长远程控制孩子使用智能设备时长。
发明内容
本申请的目的在于提供一种指纹验证方法、电子设备与服务器,该方法用以实现远程指纹验证。
上述目标和其他目标将通过独立权利要求中的特征来达成。进一步的实现方式在从属权利要求、说明书和附图中体现。
第一方面,本申请实施例提供一种指纹验证方法,该方法可以由第一电子设备执行,第一电子设备例如为手机、平板电脑等。该方法包括:第一电子设备接收来自服务器的第一信息,其中,第一信息中包括第一标识,第一标识为第一指纹的标识;显示第一指纹验证界面,并检测到第一用户在第一指纹验证界面上进行的第一操作;响应于第一操作,获取第二指纹;将第二指纹与第一指纹进行匹配;向服务器发送第一匹配结果,第一匹配结果用于指示匹配成功或匹配失败,且第一匹配结果用于与第一标识关联的电子设备的解锁。
在上述实施例中,第一电子设备响应于第一信息,显示第一指纹验界面,并检测用户在第一指纹验证界面上的第一操作,获取第二指纹。之后,将第二指纹与第一指纹进行匹配,得到第一匹配结果,该第一匹配结果可以用于与第一标识关联的电子设备的解锁,从 而实现了远程指纹验证。
在一种可能的设计中,第一信息还包括第一账号信息,第一账号信息用于指示与第一指纹关联的账号。通过该设计,服务器或电子设备可以以账号为索引存储指纹,例如,在电子设备侧,可以将账号、指纹的标识以及指纹特征三者进行关联,在服务器侧,可以将账号、电子设备以及指纹的标识三者进行关联,这样可以实现异账号下的多指纹远程验证。
在一种可能的设计中,在接收来自服务器的第一信息之前,方法还包括:接收来自服务器的第二信息,第二信息是对第一指纹特征进行加密后得到的信息,第一指纹特征为第一指纹的特征;将第一指纹与第一电子设备存储的全部或部分指纹进行匹配;向服务器发送第三信息,其中,在第一电子设备存储有第一指纹的情况下,第三信息包括第一标识,在第一电子设备未存储第一指纹的情况下,第三消息用于指示第一电子设备未存储第一指纹。通过该设计,在第一电子设备的指纹录入过程中,第二电子设备可以接收来自第一电子设备的第二信息,并基于该第二信息判断第二电子设备是否存储第一指纹,在存储的情况下,将第一指纹的标识,也即是第一标识发送给第一电子设备,从而可以包括同一账号下同一个指纹对应的指纹的标识具有唯一性。另外,第二信息是对第一指纹特征进行加密后得到的,可以避免指纹特征在网络中的传输,保证了指纹特征的安全性和保密性。
第二方面,本申请实施例提供一种指纹验证方法,该方法可以由服务器执行,服务器例如为云端服务器、单服务器或服务器集群等。该方法中,服务器接收来自第二电子设备的第一信息,其中,第一信息中包括第一标识,第一标识为第一指纹的标识;服务器确定与第一信息关联的第一电子设备;服务器将第一信息发送给第一电子设备;服务器接收来自第一电子设备的第一匹配结果,第一匹配结果用于指示匹配成功或匹配失败,第一匹配结果用于第二电子设备的解锁;服务器将第一匹配结果发送给第二电子设备。
在一种可能的设计中,第一信息还包括第一账号信息,第一账号信息用于指示与第一指纹关联的账号。
在一种可能的设计中,在接收来自第二电子设备的第一信息之前,方法还包括:
接收来自第二电子设备的第二信息,第二信息是对第一指纹特征进行加密后得到的信息,第一指纹特征为第一指纹的特征;向第一电子设备发送第二信息;接收来自第一电子设备的第三信息,其中,在第一电子设备存储有第一指纹的情况下,第三信息包括第一标识,在第一电子设备未存储第一指纹的情况下,第三信息用于指示第一电子设备未存储第一指纹;将第一标识发送给第二电子设备。
在一种可能的设计中,将第一标识发送给第二电子设备,包括:在第一电子设备存储有第一指纹的情况下,将第三信息发送给第二电子设备;或者,在第一电子设备未存储第一指纹的情况下,为第一指纹配置第一标识,并将第一标识发送给第二电子设备。通过该设计,服务器可以为第一指纹配置标识,由于服务器维护有电子设备、指纹的标识的对应关系,因此由服务器来同一分配标识,可以保证指纹的标识的唯一性。
第三方面,本申请实施例提供一种指纹验证方法,该方法可以由第二电子设备,第二电子设备例如手机、平板电脑等。在该方法中,第二电子设备显示锁屏界面;第二电子设备对锁屏界面的解锁失败;第二电子设备向服务器发送第一信息,第一信息用于请求解锁第二电子设备,其中,第一信息包括第一标识,第一标识为第一指纹的标识,第一指纹是第二电子设备存储的用于对第二电子设备进行解锁的指纹;第二电子设备接收来自服务器的第一匹配结果,第一匹配结果用于指示匹配成功或匹配失败;第二电子设备在第一匹配 结果指示匹配成功的情况下,显示解锁后的界面。
在一种可能的设计中,第一信息还包括第一账号信息,第一账号信息用于指示与第一指纹关联的账号。
在一种可能的设计中,在显示锁屏界面之前,方法还包括:显示指纹录入界面,并检测到第二用户在指纹录入界面上进行的第二操作;响应于第二操作,获取第一指纹;确定第二信息,第二信息是对第一指纹特征进行加密后得到的信息,第一指纹特征为第一指纹的特征;向服务器发送第二信息;接收来自服务器的第一标识。
在一种可能的设计中,在向服务器发送第二信息之前,方法还包括:将第一指纹特征与第二电子设备存储的全部或部分指纹特征进行匹配,且均匹配失败。
在一种可能的设计中,对锁屏界面的解锁失败,包括:根据第二电子设备存储的第三指纹对锁屏界面的解锁成功,且,根据第二电子设备存储的第一指纹对锁屏界面的解锁失败。通过该设计,可以实现多指纹验证,例如,同账号下的多指纹验证,或异账号下的多指纹验证。
第四方面,本申请实施例提供一种指纹验证方法,该方法可以由包括第一电子设备、服务器和第二电子设备的系统实现。在该方法中,第二电子设备显示锁屏界面;第二电子设备对锁屏界面的解锁失败;第二电子设备向服务器发送第一信息,第一信息用于请求解锁第二电子设备,其中,第一信息包括第一标识,第一标识为第一指纹的标识,第一指纹是第二电子设备存储的用于对第二电子设备进行解锁的指纹;服务器将第一信息发送给第一电子设备,第一电子设备和第二电子设备均与第一信息关联;第一电子设备显示第一指纹验证界面,并检测到第一用户在第一指纹验证界面上进行的第一操作;第一电子设备响应于第一操作,获取第二指纹;第一电子设备将第二指纹与第一指纹进行匹配;第一电子设备向服务器发送第一匹配结果,第一匹配结果用于指示匹配成功或匹配失败;服务器向第二电子设备发送第一匹配结果;在第一匹配结果指示匹配成功的情况下,第二电子设备显示解锁后的界面。
在一种可能的设计中,第一信息还包括第一账号信息,第一账号信息用于指示与第一指纹关联的账号。
在一种可能的设计中,在第二电子设备显示锁屏界面之前,方法还包括:第二电子设备显示指纹录入界面,并检测到第二用户在指纹录入界面上的第二操作;第二电子设备响应于第二操作,获取第一指纹;第二电子设备确定第二信息,第二信息是对第一指纹特征进行加密后得到的信息,第一指纹特征为第一指纹的特征;第二电子设备向服务器发送第二信息;服务器向第一电子设备发送第二信息;第一电子设备将第一指纹与第一电子设备存储的全部或部分指纹进行匹配;第一电子设备向服务器发送第三信息,其中,在第一电子设备存储有第一指纹的情况下,第三信息包括第一标识,在第一电子设备未存储第一指纹的情况下,第三信息用于指示第一电子设备未存储第一指纹;服务器将第一标识发送给第二电子设备。
在一种可能的设计中,服务器将第一标识发送给第二电子设备,包括:在第一电子设备存储有第一指纹的情况下,服务器将第三信息发送给第二电子设备;或者,在第一电子设备未存储第一指纹的情况下,服务器为第一指纹配置第一标识,并将第一标识发送给第二电子设备。
在一种可能的设计中,在第二电子设备向服务器发送第二信息之前,还包括:第二电 子设备将第一指纹特征与第二电子设备存储的全部或部分指纹特征进行匹配,且均匹配失败。
在一种可能的设计中,第二电子设备对锁屏界面的解锁失败,包括:第二电子设备根据第二电子设备存储的第三指纹对锁屏界面的解锁成功,且,根据第二电子设备存储的第一指纹对锁屏界面的解锁失败。
第五方面,本申请实施例还提供一种电子设备,该电子设备可以是第一方面或第四方面中的第一电子设备,包括:通信模块,用于与其他设备通信;一个或多个处理器;一个或多个存储器;所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述电子设备执行如上述第一方面或第四方面提供的指纹验证方案中第一电子设备执行的全部或部分方法步骤。
第六方面,本申请实施例还提供一种服务器,该服务器可以是上述第一方面或第四方面中的服务器,包括:通信模块,用于与其他设备通信;一个或多个处理器;一个或多个存储器;所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述服务器执行如上述第一方面或第四方面提供的指纹验证方案中服务器执行的全部或部分方法步骤。
第七方面,本申请实施例还提供一种电子设备,该电子设备可以是上述第一方面或第四方面中的第二电子设备,包括:通信模块,用于与其他设备通信;一个或多个处理器;一个或多个存储器;所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述电子设备执行上述第一方面或第四方面提供的指纹验证方案中第二电子设备执行的全部或部分方法步骤。
第八方面,本申请实施例还提供一种指纹验证系统,包括第一电子设备、第二电子设备和服务器,所述第一电子设备为上述第五方面所述的电子设备,所述第二电子设备上述第七方面所述的电子设备,所述服务器为上述第六方面所述的服务器。该指纹验证系统可执行如上述第四方面提供的指纹验证方案中的全部或部分方法步骤。
第九方面,本申请实施例还提供一种芯片,所述芯片与电子设备中的存储器耦合,执行本申请实施例第一方面及其第一方面任一可能设计的技术方案,或者执行本申请实施例第三方面及其第三方面任一可能设计的技术方案;本申请实施例中“耦合”是指两个部件彼此直接或间接地结合。
第十方面,本申请实施例还提供一种芯片,所述芯片与服务器中的存储器耦合,执行本申请实施例第二方面及其第二方面任一可能设计的技术方案;本申请实施例中“耦合”是指两个部件彼此直接或间接地结合。
第十一方面,本申请实施例还提供一种芯片,所述芯片与指纹验证系统中的存储器耦合,执行本申请实施例第四方面及其第四方面任一可能设计的技术方案;本申请实施例中“耦合”是指两个部件彼此直接或间接地结合。
第十二方面,本申请实施例该提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行本申请实施例第一方面及其第一方面任一可能设计的技术方案,或者执行本申请实施例第三方面及其第三方面任一可能设计的技术方案。
第十三方面,本申请实施例该提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行本申请实施例第二方面及其第二方面任一可能设计的技术方案。
第十四方面,本申请实施例该提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行本申请实施例第四方面及其第四方面任一可能设计的技术方案。
第十五方面,本申请实施例该提供一种程序产品,所述程序产品存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如本申请实施例第一方面及其第一方面任一可能设计的技术方案,或者执行如本申请实施例第三方面及其第三方面任一可能设计的技术方案。
第十六方面,本申请实施例该提供一种程序产品,所述程序产品存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如本申请实施例第二方面及其第二方面任一可能设计的技术方案。
第十七方面,本申请实施例该提供一种程序产品,所述程序产品存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如本申请实施例第四方面及其第四方面任一可能设计的技术方案。
附图说明
图1为本申请中的一种指纹验证方法的示意图;
图2为本申请实施例提供的一种应用场景的示意图;
图3为本申请实施例提供的电子设备的硬件结构示意图;
图4为本申请实施例提供的电子设备的软件结构的示意图;
图5为本申请实施例提供的一种指纹录入方法的流程示意图;
图6为本申请实施例提供的指纹录入界面的一种示意图;
图7为本申请实施例提供的验证方式选择界面的一种示意图;
图8为本申请实施例提供的指纹录入界面的再一种示意图;
图9为本申请实施例提供的指纹录入界面的另一种示意图;
图10为本申请实施例提供的一种指纹验证方法的流程示意图;
图11为本申请实施例提供的第二指纹验证界面的一种示意图;
图12为本申请实施例提供的第二指纹验证界面的另一种示意图;
图13为本申请实施例提供的第二指纹验证界面的再一种示意图;
图14为本申请实施例提供的第一指纹验证界面的一种示意图;
图15为本申请实施例提供的另一种指纹验证方法的流程示意图;
图16为本申请实施例提供的另一种指纹录入方法的流程示意图;
图17为本申请实施例提供的另一种指纹验证方法的流程示意图;
图18为本申请实施例提供的另一种指纹验证方法的流程示意图。
具体实施方式
下面将结合本申请以下实施例中的附图,对本申请实施例中的技术方案进行详尽描述。
以下实施例中所使用的术语只是为了描述特定实施例的目的,而并非旨在作为对本申请的限制。如在本申请的说明书和所附权利要求书中所使用的那样,单数表达形式“一个”、“一种”、“所述”、“上述”、“该”和“这一”旨在也包括例如“一个或多个”这种表达形式,除非其上下文中明确地有相反指示。还应当理解,在本申请实施例中,“一个或多个”是指一个、两个或两个以上;“和/或”,描述关联对象的关联关系,表示可以存在三种关系;例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A、B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。
在本说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
本申请实施例涉及的至少一个,包括一个或者多个;其中,多个是指大于或者等于两个。另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
本申请实施例涉及的应用程序(application,app),可以简称应用,为能够实现某项或多项特定功能的软件程序。通常,电子设备中可以安装多个应用,例如,即时通讯类应用、视频类应用、音频类应用、图像拍摄类应用等等。其中,即时通信类应用,例如可以包括短信应用、微信(WeChat)、WhatsApp Messenger、连我(Line)、照片分享(instagram)、Kakao Talk、钉钉等。图像拍摄类应用,例如可以包括相机应用(系统相机或第三方相机应用)。视频类应用,例如可以包括Youtube、Twitter、抖音、爱奇艺、腾讯视频等等。音频类应用,例如可以包括酷狗音乐、虾米、QQ音乐等等。以下实施例中提到的应用,可以是电子设备出厂时已安装的应用,也可以是用户在使用电子设备的过程中从网络下载或其他电子设备获取的应用。
本申请实施例提供一种指纹验证方法、电子设备及服务器,旨在实现用户对电子设备的远程解锁管理,如家长远程控制孩子使用智能设备的时长。其中,方法、电子设备以及服务器统是基于同一技术构思的,由于方法、电子设备及服务器解决问题的原理相似,因此电子设备、服务器与方法的实施可以相互参见,重复之处不再赘述。
本申请实施例提供的一种指纹验证方法可以适用于诸如手机、平板电脑、可穿戴设备(例如,手表、手环、智能头盔等)、车载设备、智能家居、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本、个人数字助理(personal digital assistant,PDA)等电子设备。
图2示出了本申请实施例提供的一种应用场景的示意图。如图2所示,该场景中包括服务器,电子设备1、电子设备2和电子设备3,且图2中的电子设备以手机为例进行描述。其中,黑色填充用于表示电子设备处于待机状态或关机状态,白色填充用于表示电子设备处于工作状态,例如,电子设备1和电子设备2处于工作状态,电子设备3处于待机状态。其中,电子设备1与服务器之间可建立网络连接,以使服务器为电子设备1提供网络服务。电子设备2与服务器之间可建立网络连接,以使服务器可以为电子设备2提供网 络服务。类似的,电子设备3与服务器之间也可建立网络连接,以使服务器为电子设备3提供网络服务。电子设备1与电子设备2之间,或电子设备1与电子设备3之间,或电子设备2与电子设备3之间皆可通过服务器进行通信。
例如,电子设备1本地存储有指纹1、指纹2、指纹3、指纹4,电子设备2本地存储有指纹3、指纹4、指纹5、指纹6,电子设备3本地存储有指纹4、指纹7、指纹8。为了实现远端指纹验证,一种可能的实现方式为,用户1在电子设备1的指纹验证界面进行触碰操作。响应于用户1的触碰操作,电子设备1获取指纹9,以及将指纹9与用于解锁电子设备1的指纹4进行匹配。在匹配成功的情况下,电子设备1成功解锁;在匹配失败的情况下,电子设备1解锁失败。进一步,电子设备1可以向服务器发送验证请求消息,该验证请求消息用于解锁电子设备1。服务器可以将验证请求消息发送给录入有指纹4的电子设备2或电子设备3。以电子设备2为例,电子设备2接收到验证请求消息后,显示指纹验证界面,并检测用户2在电子设备2的指纹验证界面的触碰操作。响应于用户2的触碰操作,获取指纹10,并将指纹10与指纹4进行匹配,得到匹配结果,以及将匹配结果通过服务器发送给电子设备1。在匹配结果指示匹配成功的情况下,电子设备1成功解锁;在匹配结果指示匹配失败的情况下,电子设备1解锁失败。
示例性的,图3示出了电子设备的结构示意图。图3所示的电子设备可以图2所示场景中的电子设备1、电子设备2或电子设备3。
如图3所示,电子设备可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。其中,控制器可以是电子设备的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备充电,也可以用于电子设备与外围设备之间传输数据。充电管理模块140用于从充电器接收充电输入。电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。
电子设备的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。天线1和天线2用于发射和接收电磁波信号。电子设备中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在电子设备上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
无线通信模块160可以提供应用在电子设备上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
显示屏194用于显示应用的显示界面等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备可以包括1个或N个显示屏194,N为大于1的正整数。
在本申请实施例中,显示屏194可用于显示指纹验证界面,以使得用户对指纹验证界面进行触碰操作,实现验证指纹的输入。以及,显示屏194还用于显示指纹录入界面,以 使得用户对指纹录入界面进行触碰操作,完成本地指纹的录入。
摄像头193用于捕获静态图像或视频。在一些实施例中,摄像头193可以包括至少一个摄像头,例如一个前置摄像头和一个后置摄像头。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,以及至少一个应用程序(例如爱奇艺应用,微信应用等)的软件代码等。存储数据区可存储电子设备使用过程中所产生的数据(例如图像、视频等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将图片,视频等文件保存在外部存储卡中。
电子设备可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
其中,传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。陀螺仪传感器180B可以用于确定电子设备的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备围绕三个轴(即,x,y和z轴)的角速度。
陀螺仪传感器180B可以用于拍摄防抖。气压传感器180C用于测量气压。在一些实施例中,电子设备通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。磁传感器180D包括霍尔传感器。电子设备可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当电子设备是翻盖机时,电子设备可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。加速度传感器180E可检测电子设备在各个方向上(一般为三轴)加速度的大小。当电子设备静止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。电子设备可以通过红外或激光测量距离。在一些实施例中,拍摄场景,电子设备可以利用距离传感器180F测距以实现快速对焦。接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备通过发光二极管向外发射红外光。电子设备使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备附近有物体。当检测到不充分的反射光时,电子设备可以确定电子设备附近没有物体。电子设备可以利用接近光传感器180G检测用户手持电子设备贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。电子设备可以根据感知的环境光亮度自适 应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测电子设备是否在口袋里,以防误触。指纹传感器180H用于采集指纹。电子设备可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,电子设备利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,电子设备执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备对电池142加热,以避免低温导致电子设备异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备对电池142的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备的表面,与显示屏194所处的位置不同。
在本申请实施例中,电子设备可以通过传感器模块180获取指纹。例如,传感器模块180可以为触摸传感器180K。例如,显示屏194显示指纹验证界面,用户在指纹验证界面进行触碰操作,触摸传感器180K检测到用户在指纹验证界面的触碰操作,并获取用户的指纹。再例如,显示屏194显示指纹录入界面,用户在指纹录入界面进行触碰操作,触摸传感器180K检测到用户在指纹录入界面的触碰操作,并获取用户的指纹。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备可以接收按键输入,产生与电子设备的用户设置以及功能控制有关的键信号输入。马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现与电子设备的接触和分离。
可以理解的是,图3所示的部件并不构成对电子设备的具体限定,电子设备还可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。以下的实施例中,以图3所示的电子设备为例进行介绍。
图4示出了本申请一实施例提供的电子设备的软件结构框图。如图4所示,电子设备的软件结构可以是分层架构,例如可以将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层(framework,FWK),安卓运行时(Android runtime)和系统库,以及内核层。
应用程序层可以包括一系列应用程序包。如图4所示,应用程序层可以包括相机、设置、皮肤模块、用户界面(user interface,UI)、三方应用程序等。其中,三方应用程序可 以包括微信、QQ、图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等。本申请实施例中涉及的用户界面可以为指纹验证界面,指纹录入界面,或锁屏界面等。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层可以包括一些预先定义的函数。如图4所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。
Android runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(media libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
硬件层可以包括各类传感器,例如本申请实施例中涉及的加速度传感器、陀螺仪传感器、触摸传感器等。例如,电子设备可以通过触摸传感器检测用户在指纹验证界面进行的触碰操作,获取用户的指纹,并对用户的指纹进行验证。再例如,电子设备可以通过触摸 传感器检测用户在指纹录入界面进行的触碰操作,获取用户的指纹并存储,完成用户指纹的录入过程。
下面结合本申请实施例的指纹验证方法,示例性说明电子设备的软件以及硬件的工作流程。
作为一个示例,电子设备1显示锁屏界面,通过触摸传感器180K检测到用户解锁操作,,获取到指纹1。系统库层中的备份判断模块,用于判断指纹1与本地存储的、用于电子设备1解锁的指纹2是否匹配。例如,在指纹1与指纹2匹配的情况下,显示界面可切换为解锁成功对应的界面。在指纹1与指纹2不匹配的情况下,电子设备1可以通过无线通信模块160或者移动通信模块150向服务器发送验证请求消息。
需要说明的是,本申请实施例中的指纹验证方法可以用于屏幕解锁、安全支付解锁或APP权限解锁等,本申请实施例对此并不限定。为了便于表述,本申请以锁屏界面解锁为例对本申请实施例进行介绍。
图5为本申请实施例提供的一种指纹录入方法的流程示意图。该方法可以适用于图2所示的应用场景中,例如第一电子设备为图2中的电子设备2,服务器为图2中的服务器,第二电子设备为图2中的电子设备1。下面以适用于图2所示的应用场景为例,对本申请实施例提供的指纹录入方法进行描述,该方法的流程如下所示。
S501:电子设备1登录账号A。
示例性的,账号A可以为电子设备1的用户账号,或者为电子设备1中的APP的用户账号,下文以账号A为电子设备1的用户账号为例进行描述。例如,用户1可以点击电子设备1的设置选项,选择电子设备1的账号登录界面,并输入账号A和账号A的登录密码。电子设备1检测到用户1在账号登录界面的登录操作,响应于用户1的登录操作,登录账号A。
示例性的,电子设备1可以将账号A告知给服务器,那么服务器可以维护账号与电子设备的关联关系。例如,电子设备1登录账号A,电子设备2登录账号A,电子设备3登录账号B,如表1所示。
表1:电子设备与账号的关联关系
Figure PCTCN2021113775-appb-000001
S502:电子设备1显示指纹录入界面。
示例性的,用户可以通过按键、触碰或语音等方式打开电子设备1的指纹录入界面。如图6所示,电子设备1的指纹录入界面中可以包括指纹录入区域61。当用户将手指放入指纹录入区域61后,电子设备1可以获取该手指的指纹。可选的,电子设备1的指纹录入界面中还可以包括账号显示区域62,用于显示指纹录入区域61采集的指纹所对应的账号,也即是显现指纹录入区域61当前采集的指纹将存储在哪个账号下。可选的,电子设备1的指纹录入界面中还可以包括退出选项,如图6中的箭头所示,用户可以通过点击该箭头退出指纹录入界面。
S503:电子设备1获取第一指纹。
示例性的,用户在指纹录入界面上进行第二操作,如触碰指纹录入界面中指纹录入区 域61。电子设备1响应于该第二操作,电子设备1获取用户输入的第一指纹。例如,电子设备1中的指纹采集与处理模块1可以检测用户在指纹录入区域61上的第二操作,并得到第一指纹。
S504:电子设备1将第一指纹特征与电子设备1存储的全部或部分指纹特征进行匹配,且皆匹配失败。
示例性的,第一指纹特征为第一指纹的特征,例如电子设备1可以提取第一指纹的特征,得到第一指纹特征。进一步,电子设备1可以将第一指纹特征与电子设备1存储的全部或部分指纹特征逐一进行匹配,且皆匹配失败,意味着电子设备1的账号A下未存储第一指纹。
例如,在电子设备1存储的全部指纹特征皆是以账号A为索引存储的情况下,电子设备1可以将第一指纹特征与电子设备1存储的全部指纹特征逐一进行匹配;在电子设备1存储的部分指纹特征为以账号A为索引存储的情况下,电子设备1可以将第一指纹特征与电子设备1中以账号A为索引存储的指纹特征逐一进行匹配。
例如,电子设备1维护有账号、指纹特征以及指纹的标识之间的关联关系。如表2所示,账号A下,标识1对应于指纹特征1,标识2对应于指纹特征2,以及标识3对应于指纹特征3;账号B下,标识1对应于指纹特征4,标识2对应于指纹特征2。电子设备1可以通过表2将第一指纹特征分别与指纹特征1、指纹特征2以及指纹特征3进行匹配。例如,电子设备1可以先将第一指纹特征与指纹特征1进行匹配,如果第一指纹特征与指纹特征1匹配成功,则第一指纹的标识为标识1,第一指纹的录入流程结束;反之,电子设备1将第一指纹特征与指纹特征2进行匹配,如果第一指纹特征与指纹特征2匹配成功,则第一指纹的标识为标识2,第一指纹的录入流程结束;反之,电子设备1将第一指纹特征与指纹特征3进行匹配,如果第一指纹特征与指纹特征3匹配成功,则第一指纹的标识为标识3,第一指纹的录入流程结束;反之,皆匹配失败,执行步骤S505所示的内容。
表2:账号、指纹的标识以及指纹特征之间的关联关系
Figure PCTCN2021113775-appb-000002
S505:电子设备1将第二信息发送给服务器,相应的,服务器接收第二信息。
其中,第二信息可用于请求获取第一标识,第一标识为第一指纹的标识,如第一指纹在账号A下的标识。
示例性的,第二信息可以是对第一指纹特征进行加密或编码后得到的信息,以保证指纹特征的安全性和保密性。例如,电子设备1可以采用预设的加密方式(或预设的编码方式)对第一指纹特征进行加密(或编码)。其中,预设的加密方式或预设的编码方式可以是电子设备1与电子设备2预先约定的。可选的,电子设备1还可以将账号A发送给服务器,那么服务器可以知道第二信息为账号A相关的指纹信息。可以理解的是,当电子设备1未将账号A发送给服务器时,服务器也可以通过其它方式获取电子设备1当前登录的账 号信息。例如,电子设备1在登录账号A之前或同时告知服务器,电子设备1登录账号A,那么服务器可以存储电子设备1的登录状态为登录账号A。
S506:服务器确定电子设备2。
示例性的,服务器可以确定账号A下存储有指纹的至少一个电子设备,并将第二信息发送给该至少一个电子设备中的部分或全部,例如服务器将第二信息发送给该至少一个电子设备中处于工作状态的电子设备。其中,该至少一个电子设备中包括电子设备2。
示例性的,服务器可以维护账号、电子设备以及指纹的标识之间的关联关系。服务器可以根据账号、电子设备以及指纹的标识之间的关联关系确定哪个电子设备存储有指纹。例如,如表3所示,账号A下:电子设备1、3没有指纹的标识,意味着电子设备1、3在账号A下没有存储指纹;电子设备2对应于标识1和标识2,意味着电子设备2在账号A下存储了两个指纹。账号B下,电子设备1对应于标识1和标识2,意味着电子设备1在账号B下存储了两个指纹;电子设备3对应于标识3,意味着电子设备3在账号B下存储了一个指纹。示例性的,同一账号下各指纹的标识具有唯一性,不同账号下相同标识所对应的指纹可以相同,也可以不同。例如,电子设备2在账号A和账号B下皆存储有指纹1,但指纹1在账号A下的标识为标识1,在账号B下的指纹的标识为标识3。
表3:账号、电子设备与指纹的标识之间的关联关系
Figure PCTCN2021113775-appb-000003
可以理解的是,在表3中的电子设备皆未存储指纹的情况下,服务器可以为第一指纹分配第一标识,并存储账号A、第一标识1以及电子设备1之间的关联关系,即执行S510所示的内容。
S507:服务器向电子设备2发送第二信息,相应的,电子设备2接收第二信息。
示例性的,第二信息可用于请求获取第一标识,第一标识为第一指纹的标识,如第一指纹在账号下的标识。其中,第二信息可以是电子设备1对第一指纹特征进行加密或编码后得到的信息,以保证指纹特征的安全性和保密性。
S508:电子设备2将第一指纹特征与电子设备2存储的全部或部分指纹特征进行匹配,得到第三信息。
示例的,在电子设备2存储有第一指纹的情况下,第三信息包括第一标识;在电子设备2未存储第一指纹的情况下,第三信息用于指示电子设备2未存储第一指纹。例如,电子设备2对第二信息进行解密或解码后,得到第一指纹特征,将第一指纹特与电子设备2存储的部分或全部指纹特征进行逐一匹配。例如,在电子设备2存储的指纹特征皆以账号A为索引进行存储的情况下,电子设备2可以将第一指纹特征与电子设备2存储的全部指纹特征逐一匹配;在电子设备2存储的部分指纹特征是以账号A为索引进行存储的情况下,电子设备2可以第一指纹特征与电子设备2中以账号A为索引进行存储的指纹特征逐一匹配。其中,电子设备2将第一指纹特征与电子设备2以账号A为索引存储的所有指纹特征 逐一匹配,在皆匹配失败的情况下,意味着电子设备2未存储第一指纹;在第一指纹特征与电子设备2以账号A为索引存储的所有指纹特征中的一个指纹特征匹配成功的情况下,意味着电子设备2存储有第一指纹,并根据第一指纹特征与指纹的标识之间的关联关系(如表2所示),确定第一标识。
S509:电子设备2将第三信息发送给服务器,相应的,服务器接收第三信息。
其中,第三信息中包括第一标识或者用于指示电子设备2未存储第一指纹。
可选的,在第三信息包括第一标识的情况下,执行步骤S511所示的内容;在第三信息指示电子设备2未存储第一指纹的情况下,执行步骤S510所示的内容。
S510:在第三信息指示电子设备2未存储第一指纹的情况下,服务器为第一指纹配置第一标识。
示例性的,服务器可以根据账号A下已使用的标识为第一指纹配置第一标识,以使得第一标识在账号A下具有唯一性。例如,如果第三信息指示电子设备2在账号A下未存储第一指纹,则服务器可以通过查询表3根据当前账号A下指纹的标识确定第一标识。以表3为例,当前账号A下指纹的标识包括标识1和标识2,服务器可以确定第一标识为标识3,或者为其它非标识1和标识2的标识,这样可以确保同一账号下每个标识的唯一性,便于统一管理。进一步的,服务器确定第一标识后,可以存储第一标识、电子设备1以及账号1的关联关系,即更新表3。
可以理解的是,如果服务器将第二信息发送给多个电子设备,则服务器为第一指纹配置第一标识是在该多个电子设备皆未存储第一指纹的情况下进行的。
S511:服务器将第一标识发送给电子设备1,相应的,电子设备1接收第一标识。
示例性的,在电子设备2存储有第一指纹的情况下,服务器可以将第三信息发送给电子设备1,第三信息包括第一标识。在电子设备2未存储第一指纹的情况下,服务器可以为第一指纹配置第一标识,并将第一标识发送给电子设备1。进一步的,电子设备1接收到第一标识后,可以存储账号A、第一标识与第一指纹特征之间的关联关系,即更新表2。电子设备1成功录入第一指纹。例如,电子设备1的显示界面中显示成功录入指纹的提示信息,如文字或图片,或者语音(或动画)播放成功录入指纹的提示信息。
至此,第一指纹的录入流程结束。
在一种可能的实施方式中,在电子设备1显示指纹录入界面之前,即在S502之前,电子设备1还可以提供验证方式供用户选择,验证方式例如包括单指纹验证,同账号多指纹验证,或异账号指纹验证等。例如,电子设备1可以显示验证方式选择界面,如图7所示,验证方式选择界面中可以包括单指纹验证选项,同账号多指纹验证选项,以及异账号多指纹验证选项。
例如,用户可以选择单指纹验证选项,进一步选择或输入账号A,那么新建的指纹将存储在账号A下,即新建的指纹以账号A为索引进行存储。例如,用户可以选择同账号多指纹验证选项,进一步选择或输入账号A以及新建多个指纹的数量,那么新建的多个指纹将存储在账号A下,即新建的多个指纹以账号A为索引进行存储。再例如,用户可以选择异账号多指纹验证选项,进一步选择或输入账号A、账号A下新建指纹的数量、账号B、以及账号B下新建指纹的数量,那么新建的指纹将会分别存储在账号A和账号B下,即新建的指纹分别以账号A和账号B为索引进行存储。
其中,单指纹验证,可以指用于解锁电子设备1的指纹为一个。例如,指纹1用于解 锁电子设备1。在电子设备1锁屏状态的情况下,如果用户向电子设备1输入指纹1,则电子设备1解锁成功,否则,电子设备1解锁失败。
同账号多指纹验证,可以指用于解锁电子设备1的指纹为多个,且该多个指纹以同一个账号为索引进行存储。例如,指纹1和指纹2用于解锁电子设备1,指纹1和指纹2存储在账号A下。在电子设备1锁屏状态的情况下,如果用户向电子设备1输入指纹1和指纹2,则电子设备1解锁成功,否则,电子设备1解锁失败。
异账号多指纹验证,可以指用于解锁电子设备1的指纹为多个,且该多个指纹以不同的账号为索引进行存储。例如,指纹1和指纹2用于解锁电子设备,指纹1存储在账号A下,指纹2存储在账号B下。在电子设备1登录找账号A,且处于锁屏状态的情况下,如果用户向电子设备1输入指纹1,则电子设备1对指纹1验证成功,并向通过服务器向电子设备2发送远程验证请求,以请求电子设备2对指纹2进行验证,其中,电子设备2登录账号B,且存储有指纹2。如果电子设备2验证成功,则电子设备1解锁成功,反之,电子设备1解锁失败。
在一种示例中,如果用户选择同账号多指纹验证,则在S503中,电子设备1可以获取至少两个指纹特征。例如,用户可以通过点击验证方式选择界面中的同账号多指纹验证选项(如图7所示),进入同账号多指纹验证的指纹录入界面。以电子设备1的解锁指纹为指纹1和指纹2为例,用户可以同时或前后将两个手指分别放在两个指纹录入区域81,或者,不同用户分别触碰两个指纹录入区域81,那么,电子设备1可以在账号A下获取到指纹1和指纹2,如图8所示。电子设备1获取到指纹1和指纹2后,可以按照图5中S504至S511所示的流程完成对指纹1和指纹2的录入。可以理解的是,用户可以在一个界面内完成多指纹的录入,也可以在多个界面内完成多指纹的录入。例如,用户可以在如图6所示的指纹录入界面中先后完成多指纹的录入。
在另一种示例中,如果用户选择异账号多指纹验证,则在S503中,电子设备1可以在至少两个账号中的每个账号下获取至少一个指纹特征。例如,用户可以通过点击验证方式选择界面中的同账号多指纹验证选项(如图7所示),进入异账号多指纹验证的指纹录入界面。以电子设备1的解锁指纹为账号A下的指纹1和账号B下的指纹2为例,用户可以同时或前后将两个手指分别放在两个指纹录入区域91,或者,不同用户分别触碰两个指纹录入区域91,那么,电子设备1可以在账号A下采集到指纹1,在账号B下采集到指纹2,如图9所示。电子设备1获取到指纹1和指纹2后,可以按照图5中S504至S511所示的流程完成对指纹1和指纹2的录入,其中,指纹1以账号A为索引进行存储,指纹2以账号B为索引进行存储。可以理解的是,用户可以在一个界面内完成多指纹的输入,也可以在多个界面内完成多指纹的输入。例如,用户可以在如图6所示的指纹录入界面中先后完成多指纹的录入。
图10为本申请实施例提供的一种指纹验证方法的流程示意图。该方法可以适用于图2所示的应用场景中,例如第一电子设备为图2中的电子设备2,服务器为图2中的服务器,第二电子设备为图2中的电子设备1。下面以适用于图2所示的应用场景为例,对本申请实施例提供的指纹验证方法进行描述,该方法的流程如下所示。
S1001:电子设备1显示锁屏界面。
例如,第二用户点亮电子设备1的屏幕,电子设备1显示锁屏界面。
S1002:电子设备1对锁屏界面解锁失败。
示例性的,在1002之前,电子设备1可以显示第二指纹验证界面,并检测第二用户在第二指纹验证界面的第三操作(如触碰操作),响应于第三操作,获取第四指纹,将第四指纹与第一指纹匹配,匹配失败,即电子设备1对锁屏界面解锁失败。
以单指纹验证为例,电子设备1的解锁指纹为指纹1。屏幕点亮后,电子设备1显示第二指纹验证界面,该第二指纹验证界面可以包括指纹验证区域111,如图11所示。例如,第二用户可以通过触碰指纹验证区域111,作为响应,电子设备1获取指纹2,进一步,电子设备1将指纹特征1与指纹特征2进行匹配,在匹配失败的情况下,电子设备1对锁屏界面解锁失败。其中,指纹特征1可以为指纹1的特征,指纹特征2可以为指纹2的特征。
以同账号多指纹验证为例,电子设备1的解锁指纹为账号A下的指纹1和指纹2。屏幕点亮后,电子设备1显示第二指纹验证界面,该第二指纹验证界面中可以包括两个指纹验证区域121,如图12所示。例如,第二用户可以通过触碰指纹验证区域121,可以向电子设备1输入指纹3,进一步,电子设备1可以将指纹特征3与指纹特征1、指纹特征2逐一进行匹配。由于电子设备1的解锁指纹为指纹1和指纹2,而电子设备1获取了一个指纹,因此,无论匹配成功与否,电子设备1对锁屏界面解锁失败。再例如,第二用户可以通过触碰指纹验证区域121,可以向电子设备1输入指纹3和指纹4,进一步,电子设备1可以根据指纹特征1和指纹特征2,逐一对指纹特征3和指纹特征4逐一进行匹配。在指纹特征1与指纹特征3不匹配,且指纹特征2与指纹特征4匹配或不匹配的情况下,电子设备1对锁屏界面解锁失败。或者,在指纹特征1与指纹特征4不匹配,指纹特征2与指纹特征3匹配或不匹配的情况下,电子设备1对锁屏界面解锁失败。或者,在指纹特征2与指纹特征3不匹配,且指纹特征1与指纹特征4不匹配的情况下,电子设备1对锁屏界面解锁失败。或者,在指纹特征2与指纹特征4不匹配,且指纹特征1与指纹特征3匹配或不匹配的情况下,电子设备1对锁屏界面解锁失败。
以异账号多指纹验证为例,电子设备1的解锁指纹为账号A下的指纹1和账号B下的指纹2。屏幕点亮后,电子设备1显示第二指纹验证界面,该第二指纹验证界面可以如图12所示。例如,电子设备1登录账号A,第二用户可以通过触碰指纹验证区域121,可以向电子设备1输入指纹3,进一步,电子设备1将指纹特征1与指纹特征3进行匹配。由于电子设备1的解锁指纹为账号A下的指纹1和账号B下的指纹2,而电子设备1当前登录账号A,且获取了一个指纹,因此,无论匹配成功与否,电子设备1对锁屏界面解锁失败。再例如,电子设备1登录账号A,第二用户可以通过触碰指纹验证区域121,可以向电子设备1输入指纹3和指纹4,进一步,电子设备1将指纹特征1与指纹特征3、指纹特征4逐一进行匹配。由于电子设备1的解锁指纹为账号A下的指纹1和账号B下的指纹2,而电子设备1当前登录账号A,因此,无论匹配成功与否,电子设备1对锁屏界面解锁失败。
可选的,第二指纹验证界面中还可以包括远程指纹验证选项132,如图13所示。例如,第二用户可以点击第二指纹验证界面中的远程指纹验证选项132,作为响应,电子设备1默认对锁屏界面解锁失败,直接向服务器发送第一信息。采用这种方式,第二用户可以选择触碰指纹验证区域131直接验证,也可以选择点击远程指纹验证选项132进行远程验证,灵活性高,可以提高用户体验。
S1003:电子设备1向服务器发送第一信息,相应的,服务器接收第一信息。
其中,第一信息可以包括第一标识,第一标识为第一指纹的标识,第一指纹用于解锁 电子设备1。
可选的,第一信息还可以包括第一账号信息,第一账号信息用于指示与第一指纹关联的账号。例如,第一指纹是以账号A为索引存储的,第一账号信息可以为账号A。再例如,第一指纹是以账号B为索引存储的,第一账号信息为账号B。
可以理解的是,本申请实施例是以第一指纹用于解锁电子设备1为例进行描述。当用于解锁电子设备1的指纹为多个时,该第一信息可以包括该多个指纹中未验证成功的至少一个指纹的标识。
S1004:服务器确定电子设备2。
示例性的,服务器可以确定存储有第一标识的一个或多个电子设备。例如,服务器可以根据账号、电子设备以及指纹的标识之间的关联关系,确定在账号A下存储有第一指纹的一个或多个电子设备,从该一个或多个电子设备中选择一个电子设备。例如,服务器通过查询表3可以确定一个或多个电子设备,该一个或多个电子设备中的任一个登录了账号A、且在账号A下存储有第一指纹。进一步,服务器可以从该一个或多个电子设备中选择电子设备2。例如,服务器可以根据状态(如工作状态、待机状态或关机状态等)、距离或通信质量等中的至少一项从该一个或多个电子设备中确定电子设备2。例如,电子设备2可以为该一个或多个电子设备中通信质量最好且处于工作状态的电子设备。
S1005:服务器将第一信息发送给电子设备2,相应的,电子设备2接收第一信息。
可选的,服务器可以向至少一个电子设备发送第一信息,该至少一个电子设备中包括电子设备2,该至少一个电子设备中的任一个在账号A下录入了第一指纹。
以同账号多指纹验证为例,待验证的指纹包括指纹1和指纹2,则服务器可以将包括指纹1的标识的第一信息发送给电子设备2,将包括指纹2的标识的第一信息发送给电子设备3,其中,电子设备2登录了账号A、且在账号A下录入有指纹1,电子设备3登录了账号A、且在账号A下录入了指纹2。
以异账号多指纹验证为例,待验证的指纹包括账号A下的指纹1和账号B下的指纹2,则服务器可以将包括指纹1的标识的第一信息发送给电子设备2,将包括指纹2的标识的第一信息发送给电子设备4,其中,电子设备2登录了账号A、且在账号A下录入有指纹1,电子设备4登录了账号B、且在账号B下录入有指纹3。
S1006:电子设备2显示第一指纹验证界面。
示例性的,电子设备2可以采用文字、语音、震动、视频或图像等方式提示用户输入第一指纹并显示第一指纹验证界面。例如,电子设备2接收到第一信息后,作为响应,电子设备2弹出远程指纹验证界面(即第一指纹验证界面),该界面中可以包括指纹验证区域141,如图14所示。可选的,远程指纹验证界面中还可以包括拒绝选项142,当用户点击拒绝选项142后,可以关闭远程指纹验证界面,并通过服务器向电子设备1发送验证失败的消息,这样可以控制电子设备1处于锁屏状态。
S1007:电子设备2检测到第一用户在第一指纹验证界面上进行的第一操作。
例如,第一用户在第一指纹验证界面上进行第一操作,如第一用户触碰第一指纹验证界面上的指纹验证区域141,作为响应,电子设备2检测到第一操作。
S1008:电子设备2获取第二指纹。
例如,电子设备2检测到第一用户在第一指纹验证界面上进行的第一操作后,获取到第二指纹。进一步,电子设备2可以提取第二指纹的特征,得到第二指纹特征。
S1009:电子设备2将第二指纹与第一指纹进行匹配,得到第一匹配结果。
示例性的,电子设备2根据电子设备2维护的账号、指纹的标识与指纹特征之间的关联关系获取第一标识对应的第一指纹特征,如电子设备2通过查询表2确定第一标识对应的第一指纹特征。进一步,电子设备2可以将第一指纹特征与第二指纹特征进行匹配,得到第一匹配结果,第一匹配结果可用于指示匹配成功或匹配失败。
S1010:电子设备2将第一匹配结果发送给服务器,相应的,服务器接收第一匹配结果。
S1011:服务器将第一匹配结果发送给电子设备1,相应的,电子设备1接收第一匹配结果。
示例性的,在S1005中,如果服务器向多个电子设备发送第一信息,则服务器将会接收来自多个电子设备的匹配结果。例如,电子设备2和电子设备3皆登录了账号A、且在账号A下录入了指纹1,在S1005中,服务器可以将包括指纹1的标识的第一信息发送给电子设备2和电子设备3,在S1011中,服务器可以接收来自电子设备2的匹配结果和电子设备3的匹配结果。其中,若电子设备2的匹配结果为匹配失败,电子设备3的匹配结果为匹配成功,则服务器可以丢弃电子设备2的匹配结果,并将电子设备3的匹配结果发送给电子设备1,或者,服务器可以丢弃电子设备3的匹配结果,并将电子设备2的匹配结果发送给电子设备1,本申请实施例对此并不限定。其中,电子设备2与电子设备3登录了不同的账号。
以同账号多指纹验证为例,在S1005中,服务器将包括指纹1的标识的第一信息发送给电子设备2,将包括指纹2的标识的第一信息发送给电子设备3,在S1011中,服务器可以接收来自电子设备2的匹配结果和电子设备3的匹配结果。在此情况下,服务器可以将电子设备2的匹配结果和电子设备3的匹配结果都发送给电子设备1。
以异账号多指纹验证为例,在S1005中,服务器将包括指纹1的标识的第一信息发送给电子设备2,将包括指纹3的标识的第一信息发送给电子设备4,在S1011中,服务器可以接收来自电子设备2的匹配结果和电子设备4的匹配结果。在此情况下,服务器可以将电子设备2的匹配结果和电子设备4的匹配结果都发送给电子设备1。其中,电子设备2与电子设备4登录了不同的账号。
可选的,电子设备1接收到第一匹配结果后,可以显示第一匹配结果,如以语音、图片、视频或文字等方式显示第一匹配结果。电子设备1也可以不显示第一匹配结果,即电子设备1确定验证成功后,直接显示解锁后的画面,即执行步骤S1012所示的内容。
S1012:在第一匹配结果指示匹配成功的情况下,电子设备1显示解锁后的界面,在第一匹配结果指示匹配失败的情况下,电子设备1屏幕解锁失败。
以同账号多指纹验证为例,在S1011中,服务器将电子设备2的匹配结果和电子设备3的匹配结果发送给电子设备1,电子设备1可以根据电子设备2的匹配结果和电子设备3的匹配结果确定屏幕解锁失败或成功。其中,在电子设备2的匹配结果为匹配成功,且电子设备3的匹配结果为匹配成功的情况下,电子设备1显示解锁后的画面,即电子设备1屏幕解锁成功;在电子设备2的匹配结果为匹配失败,且电子设备3的匹配结果为匹配成功的情况下,电子设备1屏幕解锁失败;在电子设备3的匹配结果为匹配失败,且电子设备2的匹配结果为匹配成功的情况下,电子设备1屏幕解锁失败;在电子设备2的匹配结果为匹配失败,且电子设备3的匹配结果为匹配失败的情况下,电子设备1屏幕解锁失败。
以异账号多指纹验证为例,在S1011中,服务器将电子设备2的匹配结果和电子设备4的匹配结果发送给电子设备1,电子设备1可以根据电子设备2的匹配结果和电子设备4的匹配结果确定屏幕解锁失败或成功。其中,在电子设备2的匹配结果为匹配成功,且电子设备4的匹配结果为匹配成功的情况下,电子设备1显示解锁后的画面,即电子设备1屏幕解锁成功;在电子设备2的匹配结果为匹配失败,且电子设备4的匹配结果为匹配成功的情况下,电子设备1屏幕解锁失败;在电子设备4的匹配结果为匹配失败,且电子设备3的匹配结果为匹配成功的情况下,电子设备1屏幕解锁失败;在电子设备2的匹配结果为匹配失败,且电子设备4的匹配结果为匹配失败的情况下,电子设备1屏幕解锁失败。
在一种可能的实现方式中,电子设备1与电子设备2可以通过服务器相互授权。授权之后,电子设备1和电子设备2之间可以相互进行远程指纹验证。例如,电子设备1可以远程请求电子设备2进行指纹匹配,电子设备2也可以远程请求电子设备1的指纹匹配。例如,在授权过程中,电子设备1可以确定电子设备2在各个账号下录入的指纹的标识,电子设备2也可以确定电子设备1在各个账号下录入的指纹的标识。
至此,电子设备1的远程指纹验证流程结束。
图15示出了本申请实施例提供的一种指纹验证方法的流程示意图。该方法可以适用于图2所示的应用场景中,例如第一电子设备为图2中的电子设备2,服务器为图2中的服务器,第二电子设备为图2中的电子设备1。该方法用于同一账号下的一个或多个指纹的远程验证。同一账号是指第一电子设备和第二电子设备登录同一个账号。其中,账号可以指用户账号,例如手机的用户账号,或APP用户账号等。一个账号可以在多个电子设备中同时处于登录状态,同一账号下的多个电子设备可以共享该账号的账号信息,例如账号、账号密码、头像、或使用数据等。
其中,电子设备1中包括指纹验证模块1,指纹特征与ID同步模块1,指纹采集与处理模块1以及本地指纹库1。服务器中包括指纹验证与管理模块、指纹与ID同步管理模块、账号管理和设备选择模块。电子设备2中包括指纹验证模块2,指纹特征与ID同步模块2,指纹采集与处理模块2以及本地指纹库2。
下面以电子设备1为待解锁设备,电子设备1的解锁指纹为指纹1为例,对图15中各个模块的功能进行简单描述。
指纹验证模块1,用于接收来自指纹采集与处理模块1的指纹特征2,将指纹特征2与指纹特征1进行匹配。若匹配成功,则电子设备1成功解锁,若匹配失败,则电子设备1解锁失败。其中,指纹特征2为指纹2的特征,指纹2为指纹采集与处理模块1在电子设备1的指纹验证界面中采集的指纹。在匹配失败的情况下,指纹验证模块1可以将第一标识发送给服务器。例如,指纹验证模块1可以实现上述实施例中S504,以及S1002所示的内容。
指纹验证模块2,用于识别来自服务器的验证请求;接收来自指纹采集与处理模块2的指纹特征3;以及将指纹特征3与指纹特征1进行匹配,并将匹配结果发送给服务器。若匹配结果指示匹配成功,则电子设备1成功解锁,若匹配结果指示匹配失败,则电子设备1解锁失败。其中,指纹特征3为指纹3的特征,指纹3为指纹采集与处理模块2在电子设备1的指纹验证界面中采集的指纹。例如,指纹验证模块2可以实现上述实施例中S508,以及S1009所示的内容。
指纹特征与ID同步模块1,用于维护电子设备1中指纹特征与指纹的标识之间的关联关系。例如,指纹特征1对应的标识为标识1。进一步,指纹特征与ID同步模块1,还用于维护电子设备1中账号,指纹特征与指纹的标识之间的关联关系。例如,指纹特征1与标识1对应于账号A。指纹特征与ID同步模块2,用于维护电子设备2中指纹特征与指纹的标识之间的关联关系。进一步,指纹特征与ID同步模块2,还用于维护电子设备2中账号,指纹特征与指纹的标识之间的关联关系,如在根据第一标识确定第一指纹特征。
指纹采集与处理模块1,用于检测第二用户在第二指纹验证界面或指纹录入界面中的触碰操作,响应于第二用户的触碰操作,并获取第二用户输入的指纹,以及提取该指纹的指纹特征。例如,指纹采集与处理模块1可以实现上述实施例中S503,以及S1002所示的内容。指纹采集与处理模块2,用于检测第一用户在第一指纹验证界面的触碰操作,响应于第一用户的触碰操作,并获取第一用户输入的指纹,以及提取该指纹的指纹特征。例如,指纹采集与处理模块2可以实现上述实施例中S1007以及S1008所示的内容。
本地指纹库1,用于存储指纹采集与处理模块1获取的一个或多个指纹特征。本地指纹库1中的一个或多个指纹特征中的部分或全部指纹特征可作为电子设备1的解锁指纹。本地指纹库2,用于存储指纹采集与处理模块2获取的一个或多个指纹特征。本地指纹库2中的一个或多个指纹特征中的部分或全部指纹特征可作为电子设备2的解锁指纹。在本申请实施例中,本地指纹库2的部分或全部指纹特征可用于电子设备1的解锁验证。本地指纹库1的部分或全部指纹特征与本地指纹库2的部分或全部指纹特征可以相同。例如,本地指纹库1或本地指纹库2中存储有账号、指纹的标识与指纹特征之间的关联关系,如表2所示。
指纹验证管理模块,用于接收来自电子设备1的验证请求消息,该验证请求消息为用于请求远程指纹验证的请求消息。
指纹与ID同步管理模块,用于维护电子设备与标识之间的关联关系,为电子设备录入的指纹分配标识。例如,电子设备1与标识1对应,电子设备2与标识1对应,电子设备2与标识2对应。
账号管理模块,用于维护电子设备与账号之间的关联关系,例如,电子设备1与电子设备1曾经登录和/或当前登录的账号之间的对应关系,如表1所示。例如指纹与ID同步管理模块和账号管理模块可共同维护电子设备、账号以及指纹的标识之间的关联关系,如表3所示。
设备选择模块,用于从服务器服务的多个电子设备中选择一个电子设备进行远程指纹验证,以解锁电子设备1。例如,设备选择模块可以根据电子设备的状态(如待机状态或工作状态),通信质量等从多个电子设备选择一个电子设备进行远程指纹验证。例如,设备选择模块可以用于实现上述实施例中S506以及S1004所示的内容。
需要说明的是,本申请实施例对电子设备的模块的划分方式仅为一种示例,本申请实施例对此并不限定。例如,电子设备1还可以包括显示模块,用于显示指纹验证界面,或指纹录入界面,或屏锁界面。例如,电子设备1还可以划分为指纹验证模块和存储模块。指纹验证模块可以用于实现指纹验证模块1、指纹特征与ID同步模块1、以及指纹采集与处理模块1所实现的功能,存储模块可用于实现本地指纹库1所实现的功能。或者,电子设备还可以有其他的模块划分方式。另外,本申请实施例对于模块的名称也不做限制,本申请实施例所述的指纹验证模块1、指纹特征与ID同步模块1、指纹采集与处理模块1以 及本地指纹库1等名称,只是一种示例。
需要说明的是,本申请实施例对服务器的模块的划分方式仅为一种示例,本申请实施例对此并不限定。例如,服务器还可以划分为指纹验证模块和收发模块。指纹验证模块可以用于实现指纹验证管理模块、指纹与ID同步管理模块、账号管理模块及设备选择模块所实现的部分或全部功能,收发模块用于实现与电子设备间的通信。或者,服务器还可以有其他的模块划分方式。另外,本申请实施例对于模块的名称也不做限制,本申请实施例所述的指纹验证管理模块、指纹与ID同步管理模块、账号管理模块及设备选择模块等名称,只是一种示例。
图16为本申请实施例提供的一种指纹录入方法的流程示意图。本实施例中用于结合图15描述指纹的录入。如图16所示,该方法的流程可以如下所示。
S1601:电子设备1登录账号A,电子设备2登录账号A。
例如,账号A可以为电子设备的用户账号,该账号可以同时在多个电子设备上登录。
S1602:用户发起指纹录入,并向电子设备1录入指纹1。
示例性的,用户可以通过触摸指纹录入界面中的指纹录入区域向电子设备1输入指纹1,相应的,电子设备1的指纹采集与处理模块1获取指纹1。
S1603:指纹采集与处理模块1提取指纹1的指纹特征(记为指纹特征1)。
S1604:指纹采集与处理模块1将指纹特征1发送给指纹验证模块1。
S1605:指纹验证模块1将指纹特征1与本地的全部或部分指纹特征1进行皆匹配失败。
例如,电子设备1的指纹验证模块1可以通过将指纹特征1与本地指纹库1中的全部或部分指纹特征逐一匹配。若指纹特征1与本地指纹库1中的全部或部分中的一个匹配成功,则电子设备1的指纹验证模块1可以确定本地账号A下已录入指纹1,向用户提示指纹1录入成功的消息,即执行S1615所示的内容;否则,电子设备1的指纹验证模块1可以确定本地账号A下未录入指纹1,即执行S1605所示的内容。
S1606:指纹验证模块1对指纹特征1进行加密,得到第二信息。
S1607:电子设备1的指纹验证模块1将第二信息发送给服务器,相应的,服务器的指纹验证管理模块接收第二信息。
S1608:服务器的指纹验证管理模块确定录有指纹的至少一个电子设备。
示例的,服务器的指纹验证管理模块可以查询表3确定账号A下录入有指纹的至少一个电子设备。其中,该至少一个电子设备中包括电子设备2。其中,表3可以由账号管理模块和指纹与ID同步管理模块共同维护的。
1609:服务器的指纹验证管理模块第二信息发送给电子设备2,相应的,电子设备2中的指纹验证模块2接收第二信息。
1610:指纹验证模块2根据第二信息确定指纹特征1。
例如,指纹验证模块2可以对第二信息解密,得到指纹特征1。
S1611:指纹验证模块2将本地账号A下的指纹特征与指纹特征1进行匹配,得到第三信息。
示例的,电子设备2的指纹验证模块2可以将指纹特征1与本地账号A下存储的至少一个指纹特征逐一匹配,若指纹特征1与本地账号A下存储的至少一个指纹特征中的一个匹配,则第三信息包括第一标识,反之,则第三信息用于指示电子设备2未存储指纹1。
S1612:电子设备2的指纹验证模块2将第三信息发送给服务器,相应的,服务器的指纹验证管理模块接收第三信息。
可选的,若第三信息包括第一标识,则执行S1614所示的内容,反之,则执行S1613所示的内容。
S1613:服务器的指纹验证管理模块确定指纹1的标识。
例如,服务器的指纹验证模块可以根据表3中账号A下已有指纹的标识确定指纹1的标识,以使指纹1的标识在账号A下是唯一的。
S1614:服务器的指纹验证管理模块将第一标识发送给电子设备1,相应的,电子设备1的指纹验证模块2接收第一标识。
示例的,电子设备1的指纹验证模块2接收到第一标识后,可以将账号A、第一标识、以及指纹特征1之间的关联关系存储在本地指纹库1中。
S1615:电子设备1向用户提示的指纹1录入成功。
例如,电子设备1可以采用文字、图片、语音或视频等方式提示用户指纹1录入成功。
至此,电子设备1成功在账号A下录入指纹1。需要说明的是,图16中各个步骤的具体实现过程可参考前述实施例中图5的具体实现过程,在此不再赘述。
图17示出了本申请实施例提供的一种指纹验证方法的流程示意图。本实施例中用于描述同账号多指纹的验证。如图17所示,该方法的流程可以如下所示。
S1701:电子设备1登录账号A,电子设备2登录账号A。
其中,电子设备1的解锁指纹为指纹1和指纹2。
S1702:用户1向电子设备1输入指纹3。
示例性的,用户1可以启动电子设备1,电子设备1开机动画展示完后,显示第二指纹验证界面,提示用户1输入指纹,用户1可以触摸第二指纹验证界面中的指纹验证区域,向电子设备1输入指纹3。
S1703:电子设备1的指纹采集与处理模块1提取指纹3的指纹特征(即指纹特征3)。
S1704:指纹采集与处理模块1将指纹特征3发送给电子设备1的指纹验证模块1,相应的,电子设备1的指纹验证模块1接收指纹特征3。
S1705:指纹验证模块1对指纹3进行匹配,且匹配成功。
例如,指纹验证模块1可以将指纹特征2与指纹特征3进行匹配,且匹配成功。
S1706:指纹验证模块1确定指纹1的标识(即第一标识)。
例如,指纹验证模块1可通过本地指纹库1维护的指纹特征与指纹的标识之间的对应关系,确定第一标识。
S1707:指纹验证模块1向服务器发送第一信息,相应的,服务器的指纹验证模块接收该第一信息。
示例的,第一信息中可以包括第一标识。可选的,第一信息还包括账号A。
S1708:服务器的指纹验证管理模块根据第一标识确定电子设备2。
例如,服务器的指纹验证管理模块可以指纹的标识、账号、以及电子设备的对应关系确定电子设备2。
S1709:服务器的指纹验证管理模块向电子设备2发送第一信息,相应的,电子设备2的指纹验证模块2接收第一信息。
其中,第一信息中可以包括第一标识。可选的,第一信息还包括账号A。1711:电子 设备2的指纹验证模块提示用户B输入指纹。
S1710:电子设备2显示第一指纹验证界面。
S1711:用户B向电子设备2输入指纹4,相应的,电子设备2的指纹采集与处理模块2获取到指纹4。
例如,用户B可以通过触摸远程指纹验证界面中的指纹验证区域,向电子设备2输入指纹4。
S1712:电子设备2的指纹采集与处理模块2提取指纹4的指纹特征(记为指纹特征4)。
S1713:电子设备2的指纹采集与处理模块2将指纹特征4发送给电子设备2的指纹验证模块2。
S1714:电子设备2的指纹验证模块2将指纹特征2与指纹特征4进行匹配,得到第一匹配结果。
例如,第一匹配结果用于指示匹配成功或失败。
S1715:电子设备2的指纹验证模块2将第一匹配结果发送给服务器,相应的,服务器的指纹验证管理模块接收第一匹配结果。
S1716:服务器的指纹验证管理模块将第一匹配结果发送给电子设备1,相应的,电子设备1接收第一匹配结果。
S1717:在第一匹配结果指示匹配成功的情况下,显示解锁后的界面;在第一匹配结果指示匹配失败的情况下,屏幕解锁失败。
示例的,如果第一匹配结果用于指示匹配成功,则电子设备1的指纹验证模块1可以通过显示界面向用户1显示解锁后的界面;如果第一匹配结果指示匹配失败,则电子设备1的指纹验证模块可以通过显示界面向用户1显示验证失败的信息。
至此,电子设备1完成远程指纹验证。需要说明的是,图17中各个步骤的具体实现过程可参考前述实施例中图10的具体实现过程,在此不再赘述。
图18示出了本申请实施例提供的一种指纹验证方法的流程示意图。该方法可以适用于图2所示的应用场景中,例如第一电子设备为图2中的电子设备2,服务器为图2中的服务器,第二电子设备为图2中的电子设备1。该方法用于不同账号下的多个指纹的远程验证。不同账号是指第一电子设备和第二电子设备登录不同的账号。其中,账号可以指用户账号,例如手机的用户账号,或APP用户账号等。
如图18所示,电子设备1包括指纹验证模块1,账号管理模块1,指纹采集与处理模块1以及本地指纹库1。服务器包括指纹验证与管理模块、账号管理3和设备选择模块。电子设备2中包括指纹验证模块2,账号管理模块2,指纹采集与处理模块2以及本地指纹库2。
其中,电子设备1的指纹验证模块1、指纹采集与处理模块1以及本地指纹库1的具体功能可分别参考图15中指纹验证模块1、指纹采集与处理模块1以及本地指纹库1,在此不再赘述。服务器的指纹验证与管理模块和设备选择模块可分别参考图15中的指纹验证与管理模块和设备选择模块,在此不再赘述。电子设备2的指纹验证模块2、指纹采集与处理模块2以及本地指纹库2的具体功能可分别参考图15中指纹验证模块2、指纹采集与处理模块2以及本地指纹库2,在此不再赘述。不同之处在于:
账号管理模块1,可用于支持电子设备1的异常多指纹验证。例如,账号管理模块1 中包括多个账号,电子设备1可以在该多个账号下录入指纹。再例如,电子设备1可以在不同的账号下录入指纹,以使得电子设备1的解锁指纹为不同账号下的指纹。举例而言,电子设备1的解锁指纹为账号A下的指纹1和账号B下的指纹2,电子设备1登录账号A。指纹采集与处理模块1获取指纹3,并将指纹3的特征发送给指纹验证模块1。指纹验证模块1对指纹3进行验证,并验证成功时,指纹验证模块1通过账号管理模块1确定待验证的指纹以及待验证的指纹所在的账号,得到第一信息,该第一信息包括账号B和指纹1的标识。指纹验证模块1将该第一信息发送给服务器,以请求远程指纹验证。账号管理模块3,可用于维护电子设备与账号之间的关联关系,如表1所示。账号管理模块2,可用于支持电子设备2的异常多指纹验证。例如,账号管理模块2中包括多个账号,电子设备2可以在该多个账号中录入指纹。
可选的,电子设备1与电子设备2之间通过服务器相互授权,以使的不同账号下的电子设备1和电子设备2能够响应异账号下的指纹验证。
需要说明的是,本申请实施例对电子设备的模块的划分方式仅为一种示例,本申请实施例对此并不限定。本申请实施例对服务器的模块的划分方式仅为一种示例,本申请实施例对此并不限定。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如DVD)、或者半导体介质(例如固态硬盘)等。
为了解释的目的,前面的描述是通过参考具体实施例来进行描述的。然而,上面的示例性的讨论并非意图是详尽的,也并非意图要将本申请限制到所公开的精确形式。根据以上教导内容,很多修改形式和变型形式都是可能的。选择和描述实施例是为了充分阐明本申请的原理及其实际应用,以由此使得本领域的其他技术人员能够充分利用具有适合于所构想的特定用途的各种修改的本申请以及各种实施例。

Claims (18)

  1. 一种指纹验证方法,应用于第一电子设备,其特征在于,包括:
    接收来自服务器的第一信息,其中,所述第一信息中包括第一标识,所述第一标识为第一指纹的标识;
    显示第一指纹验证界面,并检测到第一用户在所述第一指纹验证界面上进行的第一操作;
    响应于所述第一操作,获取第二指纹;
    将所述第二指纹与所述第一指纹进行匹配;
    向所述服务器发送第一匹配结果,所述第一匹配结果用于指示匹配成功或匹配失败,且所述第一匹配结果用于与所述第一标识关联的电子设备的解锁。
  2. 如权利要求1所述的方法,其特征在于,
    所述第一信息还包括第一账号信息,所述第一账号信息用于指示与所述第一指纹关联的账号。
  3. 如权利要求1或2所述的方法,其特征在于,在接收来自服务器的第一信息之前,所述方法还包括:
    接收来自所述服务器的第二信息,所述第二信息是对第一指纹特征进行加密后得到的信息,所述第一指纹特征为所述第一指纹的特征;
    将所述第一指纹与所述第一电子设备存储的全部或部分指纹进行匹配;
    向所述服务器发送第三信息,其中,在所述第一电子设备存储有所述第一指纹的情况下,所述第三信息包括所述第一标识,在所述第一电子设备未存储所述第一指纹的情况下,所述第三消息用于指示所述第一电子设备未存储所述第一指纹。
  4. 一种指纹验证方法,应用于服务器,其特征在于,包括:
    接收来自第二电子设备的第一信息,其中,所述第一信息中包括第一标识,所述第一标识为第一指纹的标识;
    确定与所述第一信息关联的第一电子设备;
    将所述第一信息发送给所述第一电子设备;
    接收来自所述第一电子设备的第一匹配结果,所述第一匹配结果用于指示匹配成功或匹配失败,所述第一匹配结果用于所述第二电子设备的解锁;
    将所述第一匹配结果发送给所述第二电子设备。
  5. 如权利要求4所述的方法,其特征在于,
    所述第一信息还包括第一账号信息,所述第一账号信息用于指示与所述第一指纹关联的账号。
  6. 如权利要求4或5所述的方法,其特征在于,在接收来自第二电子设备的第一信息之前,所述方法还包括:
    接收来自所述第二电子设备的第二信息,所述第二信息是对第一指纹特征进行加密后得到的信息,所述第一指纹特征为所述第一指纹的特征;
    向所述第一电子设备发送所述第二信息;
    接收来自所述第一电子设备的第三信息,其中,在所述第一电子设备存储有所述第一指纹的情况下,所述第三信息包括所述第一标识,在所述第一电子设备未存储所述第一指 纹的情况下,所述第三信息用于指示所述第一电子设备未存储所述第一指纹;
    将所述第一标识发送给所述第二电子设备。
  7. 如权利要求6所述的方法,其特征在于,所述将所述第一标识发送给所述第二电子设备,包括:
    在所述第一电子设备存储有所述第一指纹的情况下,将所述第三信息发送给所述第二电子设备;或者,
    在所述第一电子设备未存储所述第一指纹的情况下,为所述第一指纹配置第一标识,并将所述第一标识发送给所述第二电子设备。
  8. 一种指纹验证方法,应用于第二电子设备,其特征在于,所述方法包括:
    显示锁屏界面;
    对所述锁屏界面的解锁失败;
    向服务器发送第一信息,所述第一信息用于请求解锁所述第二电子设备,其中,所述第一信息包括第一标识,所述第一标识为第一指纹的标识,所述第一指纹是所述第二电子设备存储的用于对所述第二电子设备进行解锁的指纹;
    接收来自所述服务器的第一匹配结果,所述第一匹配结果用于指示匹配成功或匹配失败;
    在所述第一匹配结果指示匹配成功的情况下,显示解锁后的界面。
  9. 如权利要求8所述的方法,其特征在于,
    所述第一信息还包括第一账号信息,所述第一账号信息用于指示与所述第一指纹关联的账号。
  10. 如权利要求8或9所述的方法,其特征在于,在显示锁屏界面之前,所述方法还包括:
    显示指纹录入界面,并检测到第二用户在所述指纹录入界面上进行的第二操作;
    响应于所述第二操作,获取所述第一指纹;
    确定第二信息,所述第二信息是对第一指纹特征进行加密后得到的信息,所述第一指纹特征为所述第一指纹的特征;
    向所述服务器发送所述第二信息;
    接收来自所述服务器的所述第一标识。
  11. 如权利要求10所述的方法,其特征在于,在向所述服务器发送第二信息之前,所述方法还包括:
    将所述第一指纹特征与所述第二电子设备存储的全部或部分指纹特征进行匹配,且均匹配失败。
  12. 如权利要求8至11中任一项所述的方法,其特征在于,对所述锁屏界面的解锁失败,包括:
    根据所述第二电子设备存储的第三指纹对所述锁屏界面的解锁成功,且,根据所述第二电子设备存储的所述第一指纹对所述锁屏界面的解锁失败。
  13. 一种电子设备,其特征在于,包括:
    通信模块,用于与其他设备通信;
    一个或多个处理器;
    一个或多个存储器;
    所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述电子设备执行如权利要求1-3中任一项所述的方法步骤。
  14. 一种服务器,其特征在于,包括:
    通信模块,用于与其他设备通信;
    一个或多个处理器;
    一个或多个存储器;
    所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述服务器执行如权利要求4-7中任一项所述的方法步骤。
  15. 一种电子设备,其特征在于,包括:
    通信模块,用于与其他设备通信;
    一个或多个处理器;
    一个或多个存储器;
    所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述电子设备执行如权利要求8-12中任一项所述的方法步骤。
  16. 一种指纹验证系统,其特征在于,包括第一电子设备、第二电子设备和服务器,所述第一电子设备为所述权利要求13所述的电子设备,所述第二电子设备为权利要求15所述的电子设备,所述服务器为所述权利要求14所述的服务器。
  17. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如权利要求1-12中任意一项所述的方法。
  18. 一种程序产品,其特征在于,所述程序产品存储有计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行如权利要求1-12中任意一项所述的方法。
PCT/CN2021/113775 2020-10-31 2021-08-20 一种指纹验证方法、电子设备与服务器 WO2022088867A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011199074.4A CN114528538A (zh) 2020-10-31 2020-10-31 一种指纹验证方法、电子设备与服务器
CN202011199074.4 2020-10-31

Publications (1)

Publication Number Publication Date
WO2022088867A1 true WO2022088867A1 (zh) 2022-05-05

Family

ID=81381831

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/113775 WO2022088867A1 (zh) 2020-10-31 2021-08-20 一种指纹验证方法、电子设备与服务器

Country Status (2)

Country Link
CN (1) CN114528538A (zh)
WO (1) WO2022088867A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116049810A (zh) * 2022-08-26 2023-05-02 荣耀终端有限公司 系统启动方法和电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101625743A (zh) * 2009-08-10 2010-01-13 优万网络技术(北京)有限公司 一种网络现场教学方法、装置和系统
CN103955968A (zh) * 2014-05-15 2014-07-30 深圳市几米电子有限公司 基于安卓平台的复合式安防考勤装置及系统
US20160180078A1 (en) * 2014-12-23 2016-06-23 Jasmeet Chhabra Technologies for enhanced user authentication using advanced sensor monitoring
CN108574657A (zh) * 2017-03-07 2018-09-25 阿里巴巴集团控股有限公司 接入服务器的方法、装置、系统以及计算设备和服务器

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101625743A (zh) * 2009-08-10 2010-01-13 优万网络技术(北京)有限公司 一种网络现场教学方法、装置和系统
CN103955968A (zh) * 2014-05-15 2014-07-30 深圳市几米电子有限公司 基于安卓平台的复合式安防考勤装置及系统
US20160180078A1 (en) * 2014-12-23 2016-06-23 Jasmeet Chhabra Technologies for enhanced user authentication using advanced sensor monitoring
CN108574657A (zh) * 2017-03-07 2018-09-25 阿里巴巴集团控股有限公司 接入服务器的方法、装置、系统以及计算设备和服务器

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116049810A (zh) * 2022-08-26 2023-05-02 荣耀终端有限公司 系统启动方法和电子设备
CN116049810B (zh) * 2022-08-26 2023-11-07 荣耀终端有限公司 系统启动方法和电子设备

Also Published As

Publication number Publication date
CN114528538A (zh) 2022-05-24

Similar Documents

Publication Publication Date Title
CN113609498B (zh) 数据保护方法及电子设备
WO2021164445A1 (zh) 一种通知处理方法、电子设备和系统
CN111466099A (zh) 一种登录方法、令牌发送方法及设备
CN114840825B (zh) 智能终端的登录方法及电子设备
WO2020150917A1 (zh) 一种应用权限的管理方法及电子设备
WO2021253975A1 (zh) 应用程序的权限管理方法、装置和电子设备
CN111221845A (zh) 一种跨设备信息搜索方法及终端设备
WO2020224447A1 (zh) 一种在联系人中添加智能家居设备的方法及系统
CN113496426A (zh) 一种推荐服务的方法、电子设备和系统
WO2022037407A1 (zh) 一种回复消息的方法、电子设备和系统
US20230422154A1 (en) Method for using cellular communication function, and related apparatus and system
CN115297405A (zh) 一种音频输出方法及终端设备
WO2021103955A1 (zh) 一种呼叫方法及装置
WO2024037032A1 (zh) 账号登录的方法及电子设备
CN114722377A (zh) 一种利用其它设备授权的方法、电子设备和系统
CN113196732B (zh) 一种跨设备认证方法及相关装置
WO2022088867A1 (zh) 一种指纹验证方法、电子设备与服务器
CN115706916A (zh) 一种基于位置信息的Wi-Fi连接方法及装置
CN114117367A (zh) 一种数据保护方法及电子设备
WO2022068156A1 (zh) 一种跨设备认证方法及相关装置
CN114465967B (zh) 一种群组内群成员隐私保护方法、通信系统和计算机可读存储介质
WO2022083721A1 (zh) 一种群组内群成员隐私保护方法与终端设备
WO2023024887A1 (zh) 跨设备认证方法和装置
WO2023142935A1 (zh) 应用组件管理方法及相关设备
WO2023072206A1 (zh) 密钥迁移方法及相关设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21884599

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21884599

Country of ref document: EP

Kind code of ref document: A1