CN107358080B - Terminal and social application software login method thereof - Google Patents

Terminal and social application software login method thereof Download PDF

Info

Publication number
CN107358080B
CN107358080B CN201710486479.8A CN201710486479A CN107358080B CN 107358080 B CN107358080 B CN 107358080B CN 201710486479 A CN201710486479 A CN 201710486479A CN 107358080 B CN107358080 B CN 107358080B
Authority
CN
China
Prior art keywords
iris
verification
application software
social application
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710486479.8A
Other languages
Chinese (zh)
Other versions
CN107358080A (en
Inventor
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710486479.8A priority Critical patent/CN107358080B/en
Publication of CN107358080A publication Critical patent/CN107358080A/en
Application granted granted Critical
Publication of CN107358080B publication Critical patent/CN107358080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Ophthalmology & Optometry (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a social application software login method of a terminal and the terminal. The terminal comprises a first verification input device, and the first verification input device comprises an iris identification module. The social application software login method comprises the following steps: judging whether to log in a social application software account or not according to user input; and starting the iris recognition module to carry out iris recognition and verification when logging in the social application software account. According to the social application software login method and the terminal of the terminal, disclosed by the embodiment of the invention, the iris identification module is started when the user logs in the social application software, so that the safety of personal information is ensured, the user does not need to perform secondary operation to input a password, convenience and rapidness are realized, and the user experience is improved.

Description

Terminal and social application software login method thereof
Technical Field
The invention relates to the field of terminals, in particular to a social application software login method of a terminal and the terminal.
Background
The existing social application software can set default login, so that the use of a user is facilitated, however, the privacy of the user is difficult to guarantee, and therefore, some social application software can set graphs or fingerprint verification to confirm the login, and the user still needs to operate the mobile phone again, so that the user experience is reduced.
Disclosure of Invention
The embodiment of the invention provides a social application software login method of a terminal and the terminal.
The social application software login method of the terminal comprises a first verification input device, wherein the first verification input device comprises an iris recognition module, and the social application software login method comprises the following steps:
judging whether to log in a social application software account or not according to user input; and
and starting the iris identification module to perform iris identification verification when logging in the social application software account.
The terminal of the embodiment of the invention comprises a first verification input device, the first verification input device comprises an iris identification module, and the terminal further comprises a processor, and the processor is used for:
judging whether to log in a social application software account or not according to user input; and
and starting the iris identification module to perform iris identification verification when logging in the social application software account.
The terminal comprises a shell, a processor, a memory, a circuit board, a power circuit, a display device, a first verification input device and a second verification input device, and is characterized in that the first verification input device comprises an iris identification module, the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the terminal; the memory is used for storing executable program codes; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to execute the social application software login method.
The computer-readable storage medium of the embodiment of the invention has instructions stored therein, and when the processor of the terminal executes the instructions, the terminal executes the social application software login method.
According to the social application software login method and the terminal of the terminal, disclosed by the embodiment of the invention, the iris identification module is started when the user logs in the social application software, so that the safety of personal information is ensured, the user does not need to perform secondary operation to input a password, convenience and rapidness are realized, and the user experience is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart illustrating a social application software login method according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
FIG. 3 is a state diagram of the flow of a social application login method in accordance with certain embodiments of the present invention.
FIG. 4 is a scenario diagram of a social application software login method in some embodiments of the invention.
FIG. 5 is a flow diagram of a social application software login method in accordance with some embodiments of the invention.
FIG. 6 is a flowchart of a social application login method according to some embodiments of the present invention
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are exemplary only for the purpose of illustrating the embodiments of the present invention and are not to be construed as limiting the embodiments of the present invention.
Referring to fig. 1 and 2, a social application software login method for a terminal according to an embodiment of the present invention includes the following steps:
s10: judging whether to log in a social application software account or not according to user input; and
s20: and when logging in the social application software account, starting an iris recognition module to carry out iris recognition and verification.
In the terminal 1000 according to the embodiment of the present invention, the terminal 1000 includes a first verification input device including the iris recognition module 100 and the processor 200. The iris recognition module 100 includes an infrared camera 110 and an infrared light source 120. The infrared camera 110 is used for receiving the reflected light of the infrared light emitted by the infrared light source 120 as an effective light source on the iris to form an iris image. As an example, the social application software login method according to the embodiment of the present invention may be implemented by terminal 1000 according to the embodiment of the present invention, and applied to terminal 1000.
Wherein, steps S10 and S20 may be implemented by the processor 200. That is, the processor 200 is configured to determine whether to log in the social application account according to the user input and start the iris recognition module 100 for iris recognition verification when logging in the social application account.
The iris recognition module 100 is generally used for recognizing the identity of a user currently using the electronic device 1000, and therefore the iris recognition module 100 is generally disposed in a front position, i.e., on a front surface of the electronic device 1000, for example, on a top end of the front surface. The iris recognition module 100 is disposed in the housing of the electronic device 1000 and exposed from the front surface. The front surface is a side surface of the electronic device 1000 for displaying, or facing a user in use.
The processor 200 may be any combination of a CPU, GPU, and stand-alone image processor of an electronic device.
When the social application software in the terminal is used for the first time, a user is usually required to register an account and set a password, and then the password and the account are required to be input when logging in before each use. In order to facilitate user operation, a user generally sets a password for remembering an account number, however, any user operating a mobile phone may log in application software, so that personal information is easily leaked, and the security is poor. If only the account is remembered instead, the password needs to be input again during each login, which is not beneficial to fast login and has poor user experience.
Referring to fig. 3, in the social application software login method according to the embodiment of the present invention, when a user uses the terminal 1000, user input is monitored, and whether the user logs in the social application software is determined according to the user input. For example, when the terminal 1000 is a mobile phone, the logged-in user input may be clicking an icon of the corresponding application software or inputting a name of the application software by voice. When the terminal 1000 is a notebook computer, the logged-in user input may be a double click of a left button of a mouse on the corresponding application software.
It is understood that the user input includes all operations of the terminal 1000 by the user, and the input operation of login is an operation related to the input of the account password of the social application program, and the specific mode is not limited to the above-disclosed input mode.
When the user logs in the social application software account number and inputs the social application software account number, the iris recognition module 100 is started, iris recognition is carried out after relevant recognition conditions of the iris recognition are met, such as light, distance, angle and other conditions, and if the recognition is successful, the user can directly log in the social application software.
Specifically, in the iris identification process, the iris positioning is performed first, and the positioning of the iris can be realized by extracting the inner boundary and the outer boundary of the iris. The inner boundary is extracted by calculating a gray level histogram of the whole iris image, and the gray level histogram has two main peak values, wherein the first peak value corresponds to the range of the pupil region in gray level concentration, and the second peak value corresponds to the range of the iris region in gray level concentration, so that a binarization threshold value is selected on the right side of the first peak value, and the pupil can be separated out to extract the inner circle boundary after the iris image is subjected to binarization processing. The extraction of the excircle boundary can adopt a Hough transformation method. Firstly, edge extraction is carried out on the iris image by using a Canny operator, and then the edge coefficient of the iris is determined by adopting Hough transformation capable of detecting an object with an undetermined shape so as to extract the excircle boundary. The position of the annular iris can be determined after the inner and outer circle boundaries are determined. And then, carrying out normalization and image enhancement processing on the positioned iris. The normalization process is to convert iris textures of different sizes into regions of fixed size through some kind of mapping (such as polarization coordinates), so as to eliminate the influence of translation, rotation and scaling on iris recognition. The image enhancement processing is to convert the positioned annular iris image into an image with the same pixel output on each gray level through local histogram equalization, namely, through point operation, so that the problem of low normalized image contrast caused by uneven illumination is solved. And then, extracting and coding the features of the iris image after normalization and image enhancement processing. Specifically, the feature extraction may be performed on the iris image using wavelet transform. The 2D Gabor functions may form a set of self-similar wavelets by scaling, rotation and translation. Multiplying and integrating the 2D Gabor function with the pixels of the iris image can generate a series of wavelet coefficients, thereby extracting image texture, namely iris characteristic information. Encoding refers to zero-crossing encoding of wavelet coefficients to obtain a series of binary encoded values. Finally, the iris characteristic information after characteristic extraction and coding and the prestored iris characteristic information are comparedAnd comparing, specifically, matching the feature codes of the iris images with the feature codes of the pre-stored iris feature information one by one so as to judge whether the iris images are the same. The matching of the feature codes can adopt a Hamming distance matching algorithm:
Figure BDA0001330599130000041
wherein A isi、BiAnd the ith bit code respectively represents the characteristic code of the iris image and the ith bit code of the pre-stored characteristic code of the iris characteristic information, and L is the length of the characteristic code. To AiAnd BiAfter the exclusive or processing is carried out, the smaller the obtained HD value is, the higher the matching degree of the feature code of the iris image and the feature code of the pre-stored iris feature information is. Therefore, whether the iris characteristic information is matched with the pre-stored iris characteristic information or not can be judged, and the iris identification is successful when the iris characteristic information is matched with the pre-stored iris characteristic information.
In other examples, after the iris information is associated with the account and the password, after the user uninstalls and reinstalls a certain social application software, the user can log in through iris recognition without filling in the account and the password after the recognition is successful.
In summary, according to the social application software login method of the terminal and the terminal 1000 in the embodiments of the present invention, when it is detected that the user logs in the social application software, the iris recognition module 100 is turned on, so that the security of personal information is ensured, and the user does not need to perform secondary input to input a password, which is convenient and fast, and improves user experience.
In some embodiments, terminal 1000 can include a cell phone, a tablet, a laptop, a wearable device, and/or the like.
Referring to fig. 4, in some embodiments, a social application software login method includes the following steps:
s30: judging whether authorized iris information exists in a user database of the social application software when logging in the account of the social application software; and
s40: the second authentication input means is activated for authentication input when no authorized iris is present.
In certain embodiments, steps S30 and S40 may be implemented by the processor 200. That is, the processor 200 is configured to determine whether authorized iris information exists in the user database of the social application software when logging in the social application software account, and activate the second authentication input device for authentication input when the authorized iris information does not exist.
The terminal 1000 further includes a second verification input device, and the second verification input device includes a password verification module, a dynamic password verification module, a short message verification module, or a fingerprint identification verification module.
The fingerprint identification module verifies the identity of the user through the fingerprint of the verification user. Specifically, fingerprint identification module collection user's fingerprint image and compare user's fingerprint and the fingerprint image of prestoring, then verify when the fingerprint image of gathering is unanimous with the fingerprint image of prestoring and pass through.
The face recognition module usually uses a front-facing camera to obtain an image of a face. Specifically, when face recognition is performed, face detection, preprocessing and feature information extraction need to be performed on an image. The face detection is to detect the position of the face part in the image, and a trained face classifier can be adopted for detection. The face image preprocessing refers to the processing of light compensation, gray level transformation, histogram equalization, normalization, geometric correction, filtering, sharpening and the like on a face image, so that the influence of illumination, noise and the like is eliminated. The characteristic information extraction refers to a process of performing characteristic modeling on the human face. The extraction of the feature information of the face generally comprises two extraction methods, namely a characterization method based on knowledge and a characterization method based on algebraic features or statistical learning. In some examples, a knowledge-based characterization method may be employed for face feature information extraction. The feature characterization method based on knowledge mainly obtains feature data which is helpful for face classification according to shape description of face organs and distance characteristics among organs, and feature components of the feature data generally comprise Euclidean distance, curvature, angle and the like among feature points. The human face feature information can be extracted by geometrically describing the local features of the organs such as eyes, nose, mouth, jaw and the like in the human face and the structural relationship among the organs. After the face feature information is extracted, the extracted face feature information is compared with the face feature information of the pre-stored authorized user, and the verification is considered to be passed when the similarity of the extracted face feature information and the pre-stored face feature information of the authorized user exceeds a preset value.
The dynamic password verification module verifies the identity of the user by verifying the dynamic password. Specifically, when the user performs the authentication operation, a dynamic password is output through a certain specific electronic device, and if the dynamic password authentication device detects that the dynamic password input by the user is consistent with the dynamic password output by the specific electronic device, the authentication is passed.
The short message verification module verifies the identity of the user through the verification short message. Specifically, when the user performs verification operation, the information platform sends a verification code short message to a preset mobile phone number, the user inputs the verification code into the short message verification device according to the short message information, and if the short message verification device detects that the verification code input by the user is consistent with the verification code short message, verification is passed.
The password verification module verifies the identity of the user through the verification password. Specifically, the user can preset a number or pattern password, when the password is input during verification operation, and when the password verification module detects that the input password is consistent with the preset verification password, the verification is passed.
Of course, in other embodiments, the second authentication input device is not limited to the above-described kind, for example, a gesture authentication device or the like.
Referring to fig. 5, in some embodiments, the method for logging in a social application software further includes the steps of:
s50: judging whether the login is successful through the iris recognition module; and
s60: and starting a second verification input device for verification input when the login fails through the iris identification module.
In certain embodiments, steps S50 and S60 may be implemented by the processor 200. Alternatively, the processor 200 is configured to determine whether the user successfully logs in through the iris recognition module 100 and activate the second verification input device for verification input when the user fails to log in through the iris recognition module 100.
When the terminal 1000 does not have the authorized iris information or fails to log in through iris recognition, the iris information may not be entered due to initial login to the social application program, or the authentication may fail due to improper detection conditions or user operation, a second authentication input device is provided at this time, so that the user can conveniently input authentication information to log in an account.
Referring to FIG. 6, in some embodiments, a social application login method includes the following steps:
s70: judging whether the login is successful through the second verification input device;
s80: prompting the user whether to enter iris information when the user successfully logs in through the second verification input device; and
s90: and when the user selects to input the iris information, the iris identification module is started to carry out iris identification so as to obtain authorized iris information.
In some embodiments, steps S70 to S90 may be implemented by the processor 200, or the processor 200 is configured to determine whether the login is successfully performed through the second authentication input device, prompt the user whether to enter iris information when the login is successfully performed through the second authentication input device, and activate the iris recognition module to perform iris recognition to obtain authorized iris information when the user selects to enter iris information.
When the user information does not have iris information and the user successfully logs in through other verification modes, the safety of the user information can be basically confirmed, namely, the user can be confirmed to be a safe user, at the moment, the user can be prompted to enter the iris information for the safety and the convenience of the user in the subsequent use process, and the iris information is used as authorized iris information and stored in a corresponding memory so as to be read during iris recognition.
In other examples, after iris information has been entered into at least one application software, the user is prompted whether to associate the current account and password with the authorized iris information when logging in other application software, and after association, the user can log in quickly through iris verification when re-installing after re-use, and the like.
The terminal comprises a shell, a processor, a memory, a circuit board, a power circuit, a display device, a first verification input device and a second verification input device, and is characterized in that the first verification input device comprises an iris identification module, the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the terminal; the memory is for storing executable program code. The processor executes the program corresponding to the executable program code by reading the executable program code stored in the memory so as to realize the social application software login method of any one of the above embodiments of the invention. In this process, the processor is configured to perform the steps of:
judging whether to log in a social application software account or not according to user input; and
and when logging in the social application software account, starting an iris recognition module to carry out iris recognition and verification.
In certain embodiments, the processor is configured to perform the steps of:
judging whether authorized iris information exists in a user database of the social application software when logging in the account of the social application software; and
the second authentication input means is activated for authentication input when no authorized iris is present.
In certain embodiments, the processor is configured to perform the steps of:
judging whether the login is successful through the iris recognition module; and
and starting a second verification input device for verification input when the login fails through the iris identification module.
In certain embodiments, the processor is configured to perform the steps of:
judging whether the login is successful through the second verification input device or not;
prompting the user whether to enter iris information when the user successfully logs in through the second verification input device; and
and when the user selects to input the iris information, starting the iris identification module to perform iris identification so as to obtain the authorized iris information.
It should be noted that the foregoing explanation on the social application software login method and the terminal 1000 is also applicable to the terminal according to the embodiment of the present invention, and is not repeated here.
The computer-readable storage medium according to the embodiment of the present invention has instructions stored therein, and when a processor of the terminal executes the instructions, the terminal executes the social application software login method according to the embodiment of the present invention, and the foregoing explanation on the social application software login method and the terminal 1000 is also applicable to the computer-readable storage medium according to the embodiment of the present invention, and is not repeated here.
In summary, according to the terminal and the computer-readable storage medium of the embodiments of the present invention, when it is detected that the user logs in the social application software, the iris identification module is started, so that the security of the personal information is ensured, and the user does not need to perform a secondary operation to input a password, which is convenient and fast, and improves the user experience.
In the description of the embodiments of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of describing the embodiments of the present invention and simplifying the description, but do not indicate or imply that the device or element referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the embodiments of the present invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the embodiments of the present invention, "a plurality" means two or more unless specifically limited otherwise.
In the description of the embodiments of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as being fixedly connected, detachably connected, or integrally connected; may be mechanically connected, may be electrically connected or may be in communication with each other; either directly or indirectly through intervening media, either internally or in any other relationship. Specific meanings of the above terms in the embodiments of the present invention can be understood by those of ordinary skill in the art according to specific situations.
In embodiments of the invention, unless expressly stated or limited otherwise, the first feature "on" or "under" the second feature may comprise the first and second features being in direct contact, or the first and second features being in contact, not directly, but via another feature therebetween. Also, the first feature being "on," "above" and "over" the second feature includes the first feature being directly on and obliquely above the second feature, or merely indicating that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature includes the first feature being directly under and obliquely below the second feature, or simply meaning that the first feature is at a lesser elevation than the second feature.
The above disclosure provides many different embodiments or examples for implementing different configurations of embodiments of the invention. In order to simplify the disclosure of embodiments of the invention, specific example components and arrangements are described above. Of course, they are merely examples and are not intended to limit the present invention. Furthermore, embodiments of the invention may repeat reference numerals and/or reference letters in the various examples, which have been repeated for purposes of simplicity and clarity and do not in themselves dictate a relationship between the various embodiments and/or arrangements discussed. In addition, embodiments of the present invention provide examples of various specific processes and materials, but one of ordinary skill in the art may recognize applications of other processes and/or use of other materials.
In the description herein, references to the description of the terms "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example" or "some examples" or the like mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, such as an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processing module-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of embodiments of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (7)

1. A social application software login method of a terminal is characterized in that the terminal comprises a first verification input device and a second verification input device, the first verification input device comprises an iris recognition module, and the social application software login method comprises the following steps:
monitoring user input, and judging whether to log in a social application software account or not according to the user input;
judging whether authorized iris information exists in a user database of the social application software when logging in a social application software account;
when the authorized iris exists, the iris identification module is started, and iris identification verification is carried out after relevant identification conditions of iris identification are met; activating the second verification input device for verification input when the authorized iris is not present; and judging whether the user successfully logs in through the second verification input device, prompting the user whether to input iris information when the user successfully logs in through the second verification input device, and starting the iris identification module to perform iris identification when the user selects to input the iris information so as to obtain the authorized iris information.
2. The social application software login method of claim 1, wherein the social application software login method comprises the steps of:
judging whether the login is successful through the iris recognition module; and
and starting the second verification input device for verification input when the login fails through the iris recognition module.
3. A terminal, characterized in that the terminal comprises a first authentication input means and a second authentication input means, the first authentication input means comprising an iris recognition module, the terminal further comprising a processor for:
monitoring user input, and judging whether to log in a social application software account or not according to the user input;
judging whether authorized iris information exists in a user database of the social application software when logging in a social application software account;
when the authorized iris exists, the iris identification module is started, and iris identification verification is carried out after relevant identification conditions of iris identification are met; activating the second verification input device for verification input when the authorized iris is not present; and judging whether the user successfully logs in through the second verification input device, prompting the user whether to input iris information when the user successfully logs in through the second verification input device, and starting the iris identification module to perform iris identification when the user selects to input the iris information so as to obtain the authorized iris information.
4. The terminal of claim 3, wherein the terminal is further configured to:
judging whether the login is successful through the iris recognition module; and
and starting the second verification input device for verification input when the login fails through the iris recognition module.
5. The terminal of claim 3, wherein the second verification input device comprises an account face recognition module, a password verification module, a short message verification module, a dynamic password verification module or a fingerprint recognition verification module.
6. A terminal is characterized by comprising a shell, a processor, a memory, a circuit board, a power circuit, a display device, a first verification input device and a second verification input device, wherein the first verification input device comprises an iris identification module,
the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the terminal; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the social application software login method according to any one of claims 1 to 2.
7. A computer readable storage medium having instructions stored therein, which when executed by a processor of a terminal, the terminal performs the social application software login method of any one of claims 1 to 2.
CN201710486479.8A 2017-06-23 2017-06-23 Terminal and social application software login method thereof Active CN107358080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710486479.8A CN107358080B (en) 2017-06-23 2017-06-23 Terminal and social application software login method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710486479.8A CN107358080B (en) 2017-06-23 2017-06-23 Terminal and social application software login method thereof

Publications (2)

Publication Number Publication Date
CN107358080A CN107358080A (en) 2017-11-17
CN107358080B true CN107358080B (en) 2020-06-02

Family

ID=60272357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710486479.8A Active CN107358080B (en) 2017-06-23 2017-06-23 Terminal and social application software login method thereof

Country Status (1)

Country Link
CN (1) CN107358080B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008812B (en) * 2019-01-22 2021-03-16 西安网算数据科技有限公司 Website login system based on iris recognition
CN115657861A (en) * 2022-12-26 2023-01-31 北京万里红科技有限公司 Interaction method and terminal equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927658A (en) * 2014-04-08 2014-07-16 深圳市中兴移动通信有限公司 Mobile payment method and terminal
CN104065817A (en) * 2014-06-16 2014-09-24 惠州Tcl移动通信有限公司 Mobile terminal identity authentication processing method and system based on iris identification
CN105337974A (en) * 2015-10-28 2016-02-17 腾讯科技(深圳)有限公司 Account authorization method, account login method, account authorization device and client end
CN105721510A (en) * 2016-04-29 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Account login method and terminal device
CN105933348A (en) * 2016-06-30 2016-09-07 广州云移信息科技有限公司 Login method based on biological characteristics, terminal and system
CN106209805A (en) * 2016-06-30 2016-12-07 广州云移信息科技有限公司 Login method based on biological characteristic, terminal and system
CN106203031A (en) * 2016-06-28 2016-12-07 联想(北京)有限公司 Authentication method and electronic equipment
CN106790710A (en) * 2017-03-01 2017-05-31 北京海杭通讯科技有限公司 A kind of photographic method based on iris recognition and Cloud Server

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927658A (en) * 2014-04-08 2014-07-16 深圳市中兴移动通信有限公司 Mobile payment method and terminal
CN104065817A (en) * 2014-06-16 2014-09-24 惠州Tcl移动通信有限公司 Mobile terminal identity authentication processing method and system based on iris identification
CN105337974A (en) * 2015-10-28 2016-02-17 腾讯科技(深圳)有限公司 Account authorization method, account login method, account authorization device and client end
CN105721510A (en) * 2016-04-29 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Account login method and terminal device
CN106203031A (en) * 2016-06-28 2016-12-07 联想(北京)有限公司 Authentication method and electronic equipment
CN105933348A (en) * 2016-06-30 2016-09-07 广州云移信息科技有限公司 Login method based on biological characteristics, terminal and system
CN106209805A (en) * 2016-06-30 2016-12-07 广州云移信息科技有限公司 Login method based on biological characteristic, terminal and system
CN106790710A (en) * 2017-03-01 2017-05-31 北京海杭通讯科技有限公司 A kind of photographic method based on iris recognition and Cloud Server

Also Published As

Publication number Publication date
CN107358080A (en) 2017-11-17

Similar Documents

Publication Publication Date Title
CN107465809B (en) Verification method and terminal
US10095927B2 (en) Quality metrics for biometric authentication
US10108858B2 (en) Texture features for biometric authentication
Raja et al. Multi-modal authentication system for smartphones using face, iris and periocular
US20190122024A1 (en) Systems and methods for biometric recognition
US9613428B2 (en) Fingerprint authentication using stitch and cut
US9710691B1 (en) Touchless fingerprint matching systems and methods
EP3825905A1 (en) Method and apparatus with liveness test and/or biometric authentication, computer program therefore and medium storing the same
US20180046848A1 (en) Method of recognizing fingerprints, apparatus and terminal devices
CN107395862B (en) Incoming call processing method, electronic device and computer readable storage medium
CN207264409U (en) The testimony of a witness veritifies device
JP2011159035A (en) Biometric authentication apparatus, biometric authentication method and program
CN107358080B (en) Terminal and social application software login method thereof
CN110766074B (en) Method and device for testing identification qualification of abnormal grains in biological identification method
KR102014394B1 (en) Authentication method for portable secure authentication apparatus with improved security for fake fingerprints
CN110163164B (en) Fingerprint detection method and device
EP2148296A1 (en) Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, program, and vein data structure
CN107451531B (en) Iris recognition method and electronic device
KR20180065475A (en) Method and Apparatus for Restoring Fingerprint Image Using Fingerprints Left on Fingerprint Sensor and Touch Screen
CN110348276B (en) Electronic device, iris recognition method, and computer readable medium
WO2013145386A1 (en) Vein authentication system, vein authentication device and vein authentication method
Vera et al. Iris recognition algorithm on BeagleBone Black
US11373439B1 (en) Touchless fingerprint matching systems and methods
Sakhare et al. M-banking verification using OTP and biometrics
CN117894107A (en) Intelligent building security monitoring system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant