CN107451451B - Unlocking control method and related product - Google Patents

Unlocking control method and related product Download PDF

Info

Publication number
CN107451451B
CN107451451B CN201710632722.2A CN201710632722A CN107451451B CN 107451451 B CN107451451 B CN 107451451B CN 201710632722 A CN201710632722 A CN 201710632722A CN 107451451 B CN107451451 B CN 107451451B
Authority
CN
China
Prior art keywords
verification
biological
matching
value
pieces
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710632722.2A
Other languages
Chinese (zh)
Other versions
CN107451451A (en
Inventor
周意保
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710632722.2A priority Critical patent/CN107451451B/en
Publication of CN107451451A publication Critical patent/CN107451451A/en
Application granted granted Critical
Publication of CN107451451B publication Critical patent/CN107451451B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the invention discloses an unlocking control method and a related product, wherein the method comprises the following steps: verifying M pieces of biological verification information acquired by M biological identification modules, wherein each biological identification module corresponds to one piece of biological verification information; when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information; and when the verification data meets the preset conditions, confirming that the verification is successful. By adopting the invention, the success rate and the flexibility of verification can be improved.

Description

Unlocking control method and related product
Technical Field
The invention relates to the technical field of mobile terminals, and mainly relates to an unlocking control method and a related product.
Background
With the continuous development of mobile terminal technology, mobile terminals such as mobile phones, computers, tablets and the like are increasingly popularized, and unlocking operation is performed by adopting a biological recognition method. The biometric identification method comprises a fingerprint identification method, an iris identification method, a sclera identification method, a face identification method, a voiceprint identification method, a vein identification method and the like.
In the prior art, a user adopts a plurality of encryption modes to improve the data security, and 6 possible encryption modes exist in three identification methods, such as fingerprint, iris and face. Therefore, only when the input order and all the collected biometric authentication information are correct, the unlocking is performed, otherwise, the re-authentication is required, resulting in insufficient convenience of operation.
Disclosure of Invention
The embodiment of the invention provides an unlocking control method and a related product, which are used for solving the technical problem of insufficient operation convenience caused by the fact that one of a plurality of pieces of biological verification information is required to be verified again after verification fails.
In a first aspect, an embodiment of the present invention provides an unlocking control method, including:
verifying M pieces of biological verification information acquired by M biological identification modules, wherein each biological identification module corresponds to one piece of biological verification information;
when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information;
and when the verification data meets a preset condition, confirming that the verification is successful.
In a second aspect, an embodiment of the present invention provides a mobile terminal, including a processor, a memory connected to the processor, and a biometric device, where:
the biometric identification device is used for acquiring M pieces of biometric verification information, wherein M is an integer larger than 1;
the memory is used for storing preset conditions;
the processor is used for verifying the M pieces of biological verification information; when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information; and when the verification data meets the preset condition, confirming that the verification is successful.
In a third aspect, an embodiment of the present invention provides an unlocking control apparatus, including:
the verification unit is used for verifying M pieces of biological verification information acquired by the M biological identification modules, and each biological identification module corresponds to one piece of biological verification information;
a first obtaining unit, configured to obtain, when at least one piece of biometric authentication information fails to be authenticated among the M pieces of biometric authentication information, authentication data corresponding to the M pieces of biometric authentication information;
and the confirming unit is used for confirming that the current verification operation is successfully verified when the verification data meets the preset condition.
In a fourth aspect, an embodiment of the present invention provides another unlocking control method, which is applied to a mobile terminal including a processor, a memory connected to the processor, and a biometric device, where:
the biological identification device collects M pieces of biological verification information, wherein M is an integer larger than 1;
the memory stores preset conditions;
the processor verifies the M pieces of biometric authentication information; when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information; and when the verification data meets the preset condition, confirming that the verification is successful.
In a fifth aspect, an embodiment of the present invention provides another mobile terminal, including: a processor and a memory; and one or more programs; the one or more programs are stored in the memory and configured to be executed by the processor, the programs including instructions for some or all of the steps as described in the first aspect.
In a sixth aspect, the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform some or all of the steps described in the first aspect of the present invention.
In a seventh aspect, an embodiment of the present invention provides a computer program product, where the computer program product comprises a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps as described in the first aspect of an embodiment of the present invention. The computer program product may be a software installation package.
The embodiment of the invention has the following beneficial effects:
after the unlocking control method and the related products are adopted, when M pieces of biological verification information are verified, at least one piece of biological verification information is failed to verify, verification data corresponding to the M pieces of biological verification information are obtained, when the verification data meet preset conditions, verification success of current verification operation is confirmed, verification does not need to be carried out again, and therefore safety of the verification data and convenience of operation are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
fig. 1 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an unlocking control method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of another unlocking control method according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of another unlocking control method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an unlocking control device according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of another unlocking control device provided in the embodiment of the present invention;
fig. 7 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The Mobile terminal according to the embodiment of the present invention may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and the like, which have wireless communication functions. For convenience of description, the above-mentioned devices are collectively referred to as a mobile terminal. The following describes embodiments of the present invention in detail.
The embodiment of the invention provides an unlocking control method and a related product, which are used for solving the technical problem of insufficient operation convenience caused by the fact that one of a plurality of pieces of biological verification information is required to be verified again after verification fails.
The mobile terminal described in the embodiment of the present invention is provided with a biometric identification device, and the biometric identification device specifically includes at least a fingerprint identification module, an iris identification module, a face identification module, and may further include a voice identification module, a vein identification module, a sclera identification module, and other biometric identification modules. Wherein, fingerprint identification module can be fingerprint sensor module, iris identification module can include infrared light source and infrared camera, and facial identification module can be general camera module, like leading camera. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a mobile terminal 100 according to an embodiment of the present invention, where the mobile terminal 100 includes: the casing, the touch-control display screen, the mainboard, battery and subplate, be provided with infrared light source 21 on the mainboard, infrared camera 22, leading camera 23, treater 110, memory 120 and customer identification Module (Subscriber Identity Module, SIM) draw-in groove etc. be provided with the oscillator on the subplate, integrative sound chamber, VOOC dodges and fills interface and fingerprint sensor Module 24, the iris identification Module of this mobile terminal 100 is constituteed to above-mentioned infrared light source 21 and infrared camera 22, the facial identification Module of this mobile terminal 100 is constituteed to above-mentioned leading camera 23, the fingerprint identification Module of this mobile terminal 100 is constituteed to above-mentioned fingerprint sensor Module 24.
When the biometric device is an iris recognition module, the infrared light source 21 is configured to emit infrared light to irradiate the iris of the user to form reflected light, the infrared camera 22 is configured to collect the reflected light to form an iris image, and after the processor 110 acquires the iris image, the processor 110 performs processing procedures such as iris image quality evaluation, iris region positioning (including coarse positioning and fine positioning), iris preprocessing, iris feature point extraction, and iris template generation on the iris image, and the generated iris template is biometric information to be verified.
Based on the mobile terminal 100 described in fig. 1, the following operations may be performed:
in an embodiment of the present invention, the biometric device is configured to acquire M pieces of biometric authentication information.
Wherein M is an integer greater than 1. And each verification operation is provided with a verification sequence and a biometric identification module called in each verification step, and after the verification operation is triggered, the mobile terminal starts a corresponding biometric identification device to acquire biometric verification information to obtain a plurality of biometric verification information.
For example, the biometric device called for screen unlocking verification is a fingerprint identification module and a face identification module, and when a user touches the touch display screen integrated with the fingerprint identification module after waking up the screen, the touch display screen notifies the fingerprint identification module to collect fingerprint verification information and notifies the face identification module to collect face verification information after detecting the touch operation.
In the embodiment of the present invention, the memory 120 is used for storing preset conditions. The processor 110 is configured to verify the M pieces of biometric authentication information; when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information; and when the verification data meets the preset condition, confirming that the verification is successful.
The preset condition is not limited in the embodiment of the present invention, and the preset condition may include at least one of the following: the verification sequence, the matching threshold of each piece of biometric verification information and the preset biometric verification information, the acquisition time of each piece of biometric verification information, the ratio of the number of successfully verified biometric verification information to M, and the like.
It can be seen that, in the embodiment of the present invention, when M pieces of biometric authentication information are authenticated, at least one piece of biometric authentication information fails to be authenticated, the authentication data corresponding to the M pieces of biometric authentication information is obtained, and when the authentication data satisfies the preset condition, it is determined that the current authentication operation is successfully authenticated, and then the authentication does not need to be performed again, thereby improving the security of the authentication data and the convenience of the operation.
The processor 110 obtains a matching value between each piece of biometric authentication information in the M pieces of biometric authentication information and the preset biometric authentication information, and obtains M matching values. Judging whether the preset condition is met according to the average value or the weighted average value, the maximum matching value, the minimum matching value or a plurality of the M matching values, wherein the preset condition is not limited in the embodiment of the invention.
Optionally, the verification data includes M matching values; the preset condition is that at least two matching values in the M matching values meet the corresponding matching conditions. That is, the preset condition is satisfied as long as two of the matching values satisfy the matching condition.
For example, assume that the matching threshold for the fingerprint recognition module is 85%, the matching threshold for the voice recognition module is 80%, and the matching threshold for the face recognition module is 88%. When the matching value of the face image and the preset face image is 80%, the matching value of the fingerprint image and the preset fingerprint image is 88%, and the matching value of the sound information and the preset sound information is 90%, two matching values satisfy the corresponding matching conditions, that is, it is confirmed that the preset conditions are satisfied, that is, the verification is successful.
In one possible example, the verification data comprises a verification order and M matching values; the memory 120 is further configured to store a preset verification sequence and a first threshold; the processor 110 is further configured to obtain an evaluation value of the verification data according to the M matching values when the verification order is consistent with the preset verification order; and confirming that the verification data satisfies the preset condition when the evaluation value is greater than or equal to the first threshold.
The evaluation value may be a weighted average value of a plurality of performance parameters, the verification performance parameters may include verification time, a matching value, power consumption, and the like, and the evaluation value calculated according to a plurality of dimensions of the verification data may improve description accuracy of the evaluation value, thereby improving security of the verification data.
Optionally, the memory 120 is further configured to store a weight corresponding to each matching value; in terms of the processor 110 obtaining the evaluation value of the verification data according to the M matching values, the processor 110 is specifically configured to: and acquiring the evaluation value according to each matching value in the M matching values and the weight value corresponding to the matching value.
For example, assuming that the first threshold is 0.8, the preset verification sequence is the fingerprint identification module, the voice identification module and the face identification module in sequence, wherein the matching threshold corresponding to the fingerprint identification module is 80% and the weight is 0.6; the matching threshold corresponding to the voice recognition module is 80%, and the weight is 0.3; the matching threshold corresponding to the face recognition module is 80% and the weight is 0.1. If the matching value of the fingerprint image collected by the fingerprint identification module and the preset fingerprint image is 88%, the matching value of the voice fragment collected by the voice identification module and the preset voice fragment is 78%, and the matching value of the face image collected by the face identification module and the preset face image is 82%, the voice identification module fails to verify, and if the verification sequence is consistent with the preset verification sequence, the evaluation value of 88% + 0.6+ 78% + 0.3+ 82% + 0.1 is calculated to be 0.844 and is greater than a first threshold, the verification data is confirmed to meet the preset condition, namely, the verification is successful. By calculating the evaluation values of the plurality of matching values, the description accuracy of the evaluation values can be improved, thereby improving the security of the verification data.
In one possible example, the biometric identification device further comprises an alternative biometric acquisition module; the memory 120 is further configured to store preset target biometric authentication information and a second threshold; the biometric identification device is further configured to control the candidate biometric identification module to acquire target biometric verification information after the processor 110 obtains the evaluation value of the verification data according to the M matching values; the processor 110 is further configured to obtain a target matching value between the target biometric authentication information and the preset target biometric authentication information when the evaluation value is smaller than the first threshold; and when the target matching value is greater than or equal to the second threshold value, confirming that the verification data meets the preset condition.
The alternative biometric module in the embodiment of the present invention is not limited, and may be a preset biometric module, one of historical multi-biometric modules, a biometric module obtained according to an absolute value of a difference between the evaluation value and the first threshold, or the like. It should be noted that the alternative biometric module includes at least one biometric module, thereby improving the security of the authentication.
For example, assuming that the evaluation value is 0.706, as shown in table 1, the relationship between the evaluation value range and the candidate biometric module, the candidate biometric module may be obtained as a voice recognition module and a face recognition module.
TABLE 1
Evaluation value range Alternate biometric module
[0,0.2] Fingerprint identification module, voice identification module and iris identification module
[0.2,0.4] Fingerprint identification module, voice identification module and face identification module
[0.4,0.6] Voice recognition module and iris recognition module
[0.6,0.8] Voice recognition module and face recognition module
[0.8,1.0] Fingerprint identification module
That is, when the evaluation value is less than the first threshold, the candidate biometric identification module may be enabled to collect the target biometric authentication information, and when a target matching value between the target biometric authentication information and the preset target biometric authentication information is greater than or equal to the second threshold, it is confirmed that the preset condition is satisfied, and authentication is performed by the candidate biometric identification module without a user having to tangle an authentication sequence and an authentication step in which authentication fails, thereby improving security of authentication data and convenience of operation.
For example, assuming that the first threshold is 0.85, the preset verification sequence is the fingerprint identification module, the voice identification module and the face identification module in sequence, wherein the matching threshold corresponding to the fingerprint identification module is 80% and the weight is 0.6; the matching threshold corresponding to the voice recognition module is 80%, and the weight is 0.3; the matching threshold corresponding to the face recognition module is 80% and the weight is 0.1. If the matching value of the fingerprint image collected by the fingerprint identification module and the preset fingerprint image is 88%, the matching value of the voice fragment collected by the voice identification module and the preset voice fragment is 78%, and the matching value of the face image collected by the face identification module and the preset face image is 82%, the voice identification module fails in verification, and if the verification sequence is consistent with the preset verification sequence, the alternative biometric identification module is obtained if the calculated evaluation value is 88% 0.6+ 78% 0.3+ 82% 0.1-0.844 and is smaller than a first threshold value. If the alternative biometric identification module is the iris identification module and the second threshold value is 90%, the iris identification module is used for collecting the iris image, and when the matching value of the iris image and the preset iris template is greater than 90%, the verification data meets the preset condition, namely the verification is successful, and the verification operation can be successfully verified without re-verification, so that the convenience of operation is improved. By calculating the evaluation values of the plurality of matching values, the description accuracy of the evaluation values can be improved, thereby improving the security of the verification data.
Optionally, a target matching value between the target biometric authentication information and preset target biometric authentication information is obtained; when the target matching value is smaller than a second threshold value, determining a second evaluation value according to the target matching value and a weight value corresponding to the target matching value; confirming that the verification is successful when the second evaluation value is greater than the evaluation value. That is, when the verification of the candidate biometric module fails, as long as the second evaluation value of the matching value of the candidate biometric module is greater than the evaluation value, the verification is confirmed to be successful, thereby improving the recognition rate of the verification.
Referring to fig. 2, fig. 2 is a flowchart illustrating an unlocking control method according to an embodiment of the present invention, which is applied to the mobile terminal described in fig. 1. Wherein:
201: the biometric identification device collects M pieces of biometric authentication information.
Wherein M is an integer greater than 1.
202: the memory stores preset conditions.
203: the processor verifies the M pieces of biological verification information; when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information; and confirming that the verification is successful when the verification data meets the preset condition.
It can be seen that, in the embodiment of the present invention, when M pieces of biometric authentication information are authenticated, at least one piece of biometric authentication information fails to be authenticated, the authentication data corresponding to the M pieces of biometric authentication information is obtained, and when the authentication data satisfies the preset condition, it is determined that the current authentication operation is successfully authenticated, and then the authentication does not need to be performed again, thereby improving the security of the authentication data and the convenience of the operation.
In one possible example, the verification data contains M matching values; the preset condition is that at least two matching values in the M matching values meet the corresponding matching conditions.
In one possible example, the verification data contains a verification order and M matching values; the memory stores a preset verification sequence and a first threshold; when the verification sequence is consistent with the preset verification sequence, the processor acquires evaluation values of the verification data according to the M matching values; and confirming that the verification data satisfies a preset condition when the evaluation value is greater than or equal to the first threshold.
In one possible example, the memory stores a weight value corresponding to each matching value; in the aspect that the processor obtains the evaluation value of the verification data according to the M matching values, the processor obtains the evaluation value according to each matching value in the M matching values and the weight value corresponding to the matching value.
In one possible example, the memory stores preset target biometric authentication information and a second threshold; the method comprises the steps that a biological recognition device controls an alternative biological recognition module to acquire target biological verification information after a processor acquires evaluation values of verification data according to M matching values, wherein the alternative biological recognition module is one biological recognition module in the biological recognition device; the processor acquires a target matching value between the target biometric verification information and preset target biometric verification information when the evaluation value is smaller than a first threshold value; and when the target matching value is greater than or equal to the second threshold value, confirming that the verification data meets the preset condition.
Referring to fig. 3, fig. 3 shows an unlocking control method according to an embodiment of the present invention, which is applied to the mobile terminal described in fig. 1. As shown in fig. 3, includes:
301: and verifying the M pieces of biological verification information acquired by the M biological identification modules.
Wherein, each biological identification module corresponds to one piece of biological verification information, and M is an integer larger than 1. And each verification operation is provided with a verification sequence and a biometric identification module called in each verification step, and after the verification operation is triggered, the mobile terminal starts a corresponding biometric identification device to acquire biometric verification information to obtain a plurality of biometric verification information.
302: and when at least one piece of biological verification information in the M pieces of biological verification information fails to verify, acquiring verification data corresponding to the M pieces of biological verification information.
The preset condition is not limited in the embodiment of the present invention, and the preset condition may include at least one of the following: the verification sequence, the matching threshold of each piece of biometric verification information and the preset biometric verification information, the acquisition time of each piece of biometric verification information, the ratio of the biometric verification information which is successfully verified to the M and the like.
303: and when the verification data meets the preset conditions, confirming that the verification is successful.
The matching value of each piece of biological verification information in the M pieces of biological verification information and the preset biological verification information is respectively obtained, and M matching values can be obtained. Judging whether the preset condition is met according to the average value or the weighted average value, the maximum matching value, the minimum matching value or a plurality of the M matching values, wherein the preset condition is not limited in the embodiment of the invention.
Optionally, the verification data comprises M matching values; the preset condition is that at least two matching values in the M matching values meet the corresponding matching conditions.
For example, assume that the matching threshold for the fingerprint recognition module is 85%, the matching threshold for the voice recognition module is 80%, and the matching threshold for the face recognition module is 88%. When the matching value of the face image and the preset face image is 80%, the matching value of the fingerprint image and the preset fingerprint image is 88%, and the matching value of the sound information and the preset sound information is 90%, two matching values satisfy the corresponding matching conditions, that is, it is confirmed that the preset conditions are satisfied, that is, the verification is successful.
As shown in fig. 3, in the unlocking control method, when M pieces of biometric authentication information are authenticated, at least one piece of biometric authentication information fails to be authenticated, authentication data corresponding to the M pieces of biometric authentication information is obtained, and when the authentication data satisfies a preset condition, it is determined that the current authentication operation is successfully authenticated, and then the authentication does not need to be performed again, thereby improving the convenience of operation.
Referring to fig. 4, fig. 4 is a diagram illustrating another unlocking control method according to an embodiment of the present invention, which is applied to the mobile terminal described in fig. 1. As shown in fig. 4, the unlock control method includes:
401: and verifying the M pieces of biological verification information acquired by the M biological identification modules.
402: and when at least one piece of biological verification information in the M pieces of biological verification information fails to verify, acquiring verification data corresponding to the M pieces of biological verification information.
403: and when the verification sequence is consistent with the preset verification sequence, acquiring the evaluation value of the verification data according to the M matching values.
The evaluation value may be a weighted average value of a plurality of performance parameters, the verification performance parameters may include verification time, a matching value, power consumption, and the like, and the evaluation value calculated according to a plurality of dimensions of the verification data may improve description accuracy of the evaluation value, thereby improving security of the verification data.
404: when the evaluation value is greater than or equal to the first threshold value, the verification is confirmed to be successful.
By determining whether verification is successful or not by whether the evaluation value is larger than the first threshold, the description accuracy of the evaluation value can be improved, thereby improving the security of the verification data.
Optionally, obtaining the evaluation value of the verification data according to the M matching values includes: and obtaining an evaluation value according to each matching value in the M matching values and the weight value corresponding to the matching value.
For example, assuming that the first threshold is 0.8, the preset verification sequence is the fingerprint identification module, the voice identification module and the face identification module in sequence, wherein the matching threshold corresponding to the fingerprint identification module is 80% and the weight is 0.6; the matching threshold corresponding to the voice recognition module is 80%, and the weight is 0.3; the matching threshold corresponding to the face recognition module is 80% and the weight is 0.1. If the matching value of the fingerprint image collected by the fingerprint identification module and the preset fingerprint image is 88%, the matching value of the voice fragment collected by the voice identification module and the preset voice fragment is 78%, and the matching value of the face image collected by the face identification module and the preset face image is 82%, the voice identification module fails to verify, and if the verification sequence is consistent with the preset verification sequence, the evaluation value of 88% + 0.6+ 78% + 0.3+ 82% + 0.1 is calculated to be 0.844 and is greater than a first threshold, the verification data is confirmed to meet the preset condition, namely, the verification is successful. By calculating the evaluation values of the plurality of matching values, the description accuracy of the evaluation values can be improved, thereby improving the security of the verification data.
Optionally, target biometric verification information is acquired through the alternative biometric identification module; acquiring a target matching value between target biological verification information and preset target biological verification information; and confirming that the verification is successful when the target matching value is greater than or equal to the second threshold value.
The alternative biometric module in the embodiment of the present invention is not limited, and may be a preset biometric module, one of historical multi-biometric modules, a biometric module obtained according to an absolute value of a difference between the evaluation value and the first threshold, or the like. It should be noted that the alternative biometric module includes at least one biometric module, thereby improving the security of the authentication.
That is, when the evaluation value is less than the first threshold, the candidate biometric identification module may be enabled to collect the target biometric authentication information, and when a target matching value between the target biometric authentication information and the preset target biometric authentication information is greater than or equal to the second threshold, it is confirmed that the preset condition is satisfied, and authentication is performed by the candidate biometric identification module without a user having to tangle an authentication sequence and an authentication step in which authentication fails, thereby improving security of authentication data and convenience of operation.
Optionally, a target matching value between the target biometric authentication information and preset target biometric authentication information is obtained; when the target matching value is smaller than a second threshold value, determining a second evaluation value according to the target matching value and the weight value corresponding to the target matching value; when the second evaluation value is larger than the evaluation value, the verification is confirmed to be successful.
That is, when the verification of the candidate biometric module fails, as long as the second evaluation value of the matching value of the candidate biometric module is greater than the evaluation value, the verification is confirmed to be successful, thereby improving the recognition rate of the verification.
As shown in fig. 4, in the unlocking control method, when M pieces of biometric authentication information are authenticated, at least one piece of biometric authentication information fails to be authenticated, authentication data corresponding to the M pieces of biometric authentication information is obtained, and when the authentication data satisfies a preset condition, it is determined that the current authentication operation is successfully authenticated, and then the authentication does not need to be performed again, thereby improving the security of the authentication data and the convenience of the operation.
Referring to fig. 5, fig. 5 is a block diagram of an unlocking control apparatus according to an embodiment of the present invention, as shown in fig. 5, the unlocking control apparatus 500 includes a verification unit 501, a second obtaining unit 502, and a confirmation unit 503, where:
the verification unit 501 is configured to verify M pieces of biometric verification information acquired by M biometric identification modules, where each biometric identification module corresponds to one piece of biometric verification information.
A first obtaining unit 502, configured to obtain, when at least one piece of biometric authentication information fails to be authenticated among the M pieces of biometric authentication information, authentication data corresponding to the M pieces of biometric authentication information.
A confirming unit 503, configured to confirm that the current verification operation is successfully verified when the verification data meets a preset condition.
As shown in fig. 5, in the unlocking control device, when M pieces of biometric authentication information are authenticated, at least one piece of biometric authentication information fails to be authenticated, authentication data corresponding to the M pieces of biometric authentication information is acquired, and when the authentication data satisfy a preset condition, it is determined that the current authentication operation is successfully authenticated, and then the authentication does not need to be performed again, thereby improving the security of the authentication data and the convenience of the operation.
It can be understood that the functions of each program module of the unlocking control apparatus in this embodiment may be specifically implemented according to the method in the method embodiment, and the specific implementation process may refer to the related description of the method embodiment, which is not described herein again.
Referring to fig. 6, fig. 6 is another unlocking control device according to an embodiment of the present invention, as shown in fig. 6, an unlocking control device 600 includes:
the verification unit 601 is configured to verify M pieces of biometric verification information acquired by M biometric identification modules, where each biometric identification module corresponds to one piece of biometric verification information.
A first obtaining unit 602, configured to obtain, when at least one piece of biometric authentication information fails to be authenticated among the M pieces of biometric authentication information, authentication data corresponding to the M pieces of biometric authentication information.
A second acquisition unit 603 configured to acquire an evaluation value of the verification data from the M matching values when the verification order coincides with a preset verification order.
A confirming unit 604 for confirming that the verification is successful when the evaluation value is greater than or equal to the first threshold.
As an alternative embodiment, the third obtaining unit 603 is specifically configured to obtain the evaluation value according to each of the M matching values and the weight corresponding to the matching value.
As an alternative embodiment, the apparatus 600 further comprises:
an acquisition unit 605, configured to acquire target biometric authentication information through the alternative biometric identification module;
a third obtaining unit 606 for obtaining a target matching value between the target biometric authentication information and preset target biometric authentication information;
the verification is successful when the target match value is greater than or equal to the second threshold value by the verification unit 604.
As shown in fig. 6, in the unlocking control device, when M pieces of biometric authentication information are authenticated, at least one piece of biometric authentication information fails to be authenticated, authentication data corresponding to the M pieces of biometric authentication information is acquired, and when the authentication data satisfies a preset condition, it is determined that the current authentication operation is successfully authenticated, and then the authentication does not need to be performed again, thereby improving the security of the authentication data and the convenience of the operation.
Consistent with the embodiments shown in fig. 2, fig. 3 and fig. 4, please refer to fig. 7, fig. 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention, and as shown in fig. 7, the mobile terminal 700 includes a processor 710, a memory 720, a communication interface 730 and one or more programs 740, where the one or more programs 740 are stored in the memory 720 and configured to be executed by the processor 710, and the programs 740 include instructions for:
verifying M pieces of biological verification information acquired by M biological identification modules, wherein each biological identification module corresponds to one piece of biological verification information;
when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information;
and when the verification data meets the preset conditions, confirming that the verification is successful.
It can be seen that, in the embodiment of the present invention, when M pieces of biometric authentication information are authenticated, at least one piece of biometric authentication information fails to be authenticated, the authentication data corresponding to the M pieces of biometric authentication information is obtained, and when the authentication data satisfies the preset condition, it is determined that the current authentication operation is successfully authenticated, and then the authentication does not need to be performed again, thereby improving the security of the authentication data and the convenience of the operation.
In one possible example, the verification data contains M matching values; the preset condition is that at least two matching values in the M matching values meet the corresponding matching conditions.
In one possible example, the verification data contains a verification order and M matching values; the program 740 is also for instructions to perform the steps of:
when the verification sequence is consistent with the preset verification sequence, obtaining an evaluation value of the verification data according to the M matching values;
when the evaluation value is greater than or equal to the first threshold value, it is confirmed that the verification data satisfies a preset condition.
In one possible example, program 740 is specifically configured to execute instructions for, in respect of obtaining an evaluation value of verification data from the M matching values:
and obtaining an evaluation value according to each matching value in the M matching values and the weight value corresponding to the matching value.
In one possible example, after obtaining the evaluation value of the verification data from the M matching values, the program 740 is further configured to execute instructions for:
acquiring target biological verification information through an alternative biological identification module;
acquiring a target matching value between target biological verification information and preset target biological verification information;
and when the target matching value is greater than or equal to the second threshold value, confirming that the verification data meets the preset condition.
Embodiments of the present invention also provide a computer storage medium, where the computer storage medium is used to store a computer program, and the computer program enables a computer to execute part or all of the steps of any one of the methods described in the method embodiments, and the computer includes a mobile terminal.
Embodiments of the invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as recited in the method embodiments. The computer program product may be a software installation package and the computer comprises a mobile terminal.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware or a form of software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or part of the steps of the various methods of the embodiments may be performed by associated hardware as instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (12)

1. An unlock control method, characterized by comprising:
verifying M pieces of biological verification information acquired by M biological identification modules, wherein each biological identification module corresponds to one piece of biological verification information, and M is an integer greater than 1;
when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information;
and confirming that the verification is successful when the evaluation value of the verification data meets a preset condition, wherein the evaluation value is a weighted average value of verification performance parameters including verification time, a matching value and power consumption.
2. The method of claim 1, wherein the validation data comprises M matching values;
the preset condition is that the evaluation values of the verification data corresponding to at least two of the M matching values satisfy the matching condition corresponding thereto.
3. The method of claim 2, wherein the verification data comprises a verification order and M matching values;
the method further comprises the following steps:
when the verification sequence is consistent with a preset verification sequence, obtaining an evaluation value of the verification data according to the M matching values;
confirming that the verification data satisfies the preset condition when the evaluation value is greater than or equal to a first threshold value.
4. The method according to claim 3, wherein after said obtaining the evaluation value of the verification data from the M matching values, the method further comprises:
when the evaluation value is smaller than the first threshold value, acquiring target biological verification information through an alternative biological identification module;
acquiring a target matching value between the target biological verification information and preset target biological verification information;
and when the target matching value is greater than or equal to a second threshold value, confirming that the verification data meets the preset condition.
5. A mobile terminal comprising a processor, a memory coupled to the processor, and a biometric device, wherein:
the biometric identification device is used for acquiring M pieces of biometric verification information, wherein M is an integer larger than 1;
the memory is used for storing preset conditions;
the processor is used for verifying the M pieces of biological verification information; when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information; and confirming that the verification is successful when the evaluation value of the verification data meets the preset condition, wherein the evaluation value is a weighted average value of verification performance parameters including verification time, a matching value and power consumption.
6. The mobile terminal of claim 5, wherein the verification data comprises M matching values;
the preset condition is that the evaluation values of the verification data corresponding to at least two of the M matching values satisfy the matching condition corresponding thereto.
7. The mobile terminal of claim 5, wherein the verification data comprises a verification order and M matching values;
the memory is also used for storing a preset verification sequence and a first threshold value;
the processor is further configured to obtain an evaluation value of the verification data according to the M matching values when the verification order is consistent with the preset verification order; and confirming that the verification data satisfies the preset condition when the evaluation value is greater than or equal to the first threshold.
8. The mobile terminal of claim 7,
the memory is also used for storing preset target biological verification information and a second threshold value;
the biometric identification device is further configured to control an alternative biometric identification module to acquire target biometric verification information after the processor acquires the evaluation value of the verification data according to the M matching values, where the alternative biometric identification module is one of the biometric identification devices;
the processor is further configured to acquire a target matching value between the target biometric authentication information and the preset target biometric authentication information when the evaluation value is smaller than the first threshold; and when the target matching value is greater than or equal to the second threshold value, confirming that the verification data meets the preset condition.
9. An unlock control device, comprising:
the verification unit is used for verifying M pieces of biological verification information acquired by M biological identification modules, each biological identification module corresponds to one piece of biological verification information, and M is an integer larger than 1;
a first obtaining unit, configured to obtain, when at least one piece of biometric authentication information fails to be authenticated among the M pieces of biometric authentication information, authentication data corresponding to the M pieces of biometric authentication information;
and the confirming unit is used for confirming that the verification of the current verification operation is successful when the evaluation value of the verification data meets the preset condition, wherein the evaluation value is the weighted average value of verification performance parameters including verification time, a matching value and power consumption.
10. An unlock control method applied to a mobile terminal including a processor, a memory connected to the processor, and a biometric device, wherein:
the biological identification device collects M pieces of biological verification information, wherein M is an integer larger than 1;
the memory stores preset conditions;
the processor verifies the M pieces of biometric authentication information; when at least one piece of biological verification information in the M pieces of biological verification information fails to be verified, obtaining verification data corresponding to the M pieces of biological verification information; and confirming that the verification is successful when the evaluation value of the verification data meets the preset condition, wherein the evaluation value is a weighted average value of verification performance parameters including verification time, a matching value and power consumption.
11. A mobile terminal comprising a processor, memory, a communications interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps of the method of any of claims 1-4.
12. A computer-readable storage medium for storing a computer program, wherein the computer program causes a computer to perform the method according to any one of claims 1-4.
CN201710632722.2A 2017-07-28 2017-07-28 Unlocking control method and related product Active CN107451451B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710632722.2A CN107451451B (en) 2017-07-28 2017-07-28 Unlocking control method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710632722.2A CN107451451B (en) 2017-07-28 2017-07-28 Unlocking control method and related product

Publications (2)

Publication Number Publication Date
CN107451451A CN107451451A (en) 2017-12-08
CN107451451B true CN107451451B (en) 2020-07-10

Family

ID=60489593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710632722.2A Active CN107451451B (en) 2017-07-28 2017-07-28 Unlocking control method and related product

Country Status (1)

Country Link
CN (1) CN107451451B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108615001A (en) * 2018-04-19 2018-10-02 湖南德熠智能科技有限公司 Applied to the face identification method on mobile terminal
CN110610073A (en) * 2019-09-20 2019-12-24 三星电子(中国)研发中心 Terminal unlocking verification method and device
CN112466025A (en) * 2020-11-24 2021-03-09 安徽三人信息科技有限公司 Access control method and access control device based on identity authentication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103814380A (en) * 2011-08-02 2014-05-21 高通股份有限公司 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
CN103886283A (en) * 2014-03-03 2014-06-25 天津科技大学 Method for fusing multi-biometric image information for mobile user and application thereof
CN104281836A (en) * 2014-09-12 2015-01-14 东北大学 Biometric feature recognition system and method
CN105608355A (en) * 2015-07-08 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system and terminal
CN106055959A (en) * 2016-05-31 2016-10-26 广东欧珀移动通信有限公司 Unlocking method and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10181020B2 (en) * 2015-09-21 2019-01-15 American Express Travel Related Services Company, Inc. Systems and methods for gesture based biometric security

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103814380A (en) * 2011-08-02 2014-05-21 高通股份有限公司 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
CN103886283A (en) * 2014-03-03 2014-06-25 天津科技大学 Method for fusing multi-biometric image information for mobile user and application thereof
CN104281836A (en) * 2014-09-12 2015-01-14 东北大学 Biometric feature recognition system and method
CN105608355A (en) * 2015-07-08 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system and terminal
CN106055959A (en) * 2016-05-31 2016-10-26 广东欧珀移动通信有限公司 Unlocking method and mobile terminal

Also Published As

Publication number Publication date
CN107451451A (en) 2017-12-08

Similar Documents

Publication Publication Date Title
CN107450708B (en) Unlocking control method and related product
CN107832670B (en) Face recognition method and related product
KR101997371B1 (en) Identity authentication method and apparatus, terminal and server
US10496804B2 (en) Fingerprint authentication method and system, and terminal supporting fingerprint authentication
KR101710478B1 (en) Mobile electric document system of multiple biometric
CN107506629B (en) Unlocking control method and related product
US20210004451A1 (en) Step-up authentication
CN107808127B (en) Face recognition method and related product
US9934443B2 (en) Methods and systems for detecting head motion during an authentication transaction
CN106453205B (en) identity verification method and device
CN109145558B (en) Unlocking control method and electronic device
EP3627364B1 (en) Unlocking control method and related product
CN107622243B (en) Unlocking control method and related product
KR101937136B1 (en) System and method for authenticating identity using multi-biometrics
CN107451451B (en) Unlocking control method and related product
CN107437016B (en) Application control method and related product
CN107451453B (en) Unlocking control method and related product
CN107454251B (en) Unlocking control method and related product
US10936706B2 (en) Biometric authentication
CN107818252B (en) Face recognition information synchronization method and related product
CN107517298B (en) Unlocking method and related product
CN107295192B (en) Unlocking control method and related product
CN110582771A (en) method and apparatus for performing authentication based on biometric information
CN110599639B (en) Identity verification method and related product
KR101006861B1 (en) Fingerprint Authentication Method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant