CN107465809A - Verification method and terminal - Google Patents

Verification method and terminal Download PDF

Info

Publication number
CN107465809A
CN107465809A CN201710534750.0A CN201710534750A CN107465809A CN 107465809 A CN107465809 A CN 107465809A CN 201710534750 A CN201710534750 A CN 201710534750A CN 107465809 A CN107465809 A CN 107465809A
Authority
CN
China
Prior art keywords
terminal
input unit
verification
checking input
environmental information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710534750.0A
Other languages
Chinese (zh)
Other versions
CN107465809B (en
Inventor
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710534750.0A priority Critical patent/CN107465809B/en
Publication of CN107465809A publication Critical patent/CN107465809A/en
Application granted granted Critical
Publication of CN107465809B publication Critical patent/CN107465809B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/12Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Environmental & Geological Engineering (AREA)
  • Theoretical Computer Science (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses a kind of verification method and terminal.Terminal includes at least first checking input unit and the second checking input unit, and the first checking input unit includes iris recognition module.Verification method comprises the following steps:Obtain environmental information;Judge whether environmental information reaches default verification condition;If so, then verified by iris recognition module;With if it is not, by second checking input unit verified.The verification mode and terminal of the terminal of embodiment of the present invention, when iris recognition is limited by ambient brightness, other Validation Modes are opened to be verified, one reduces the probability that iris recognition fails because being restricted, improve Consumer's Experience, two various other verification modes, add the flexibility of terminal authentication and improve security.

Description

Verification method and terminal
Technical field
The present invention relates to field of electronic devices, more particularly to a kind of verification method and terminal.
Background technology
Mobile phone verification mode includes password, fingerprint and iris.Every kind of verification mode all cuts both ways, for example, password authentification Easy to use but security is relatively low, and still applicable situation is limited for iris verification security highest, therefore, does not manage in the prior art The verification method thought.
The content of the invention
Embodiments of the present invention provide a kind of verification method and terminal.
The verification method of embodiment of the present invention, applied to terminal, the terminal includes at least first checking input unit With the second checking input unit, the first checking input unit includes iris recognition module, and the verification method includes following Step:
Obtain environmental information;
Judge whether environmental information reaches default verification condition;
If so, then verified by the iris recognition module;With
If it is not, verified by the described second checking input unit.
The terminal of embodiment of the present invention, the terminal include:
Ambient light sensor, for obtaining the environmental information around the terminal;
Processor, for judging whether information reaches default verification condition described in judging;
Iris recognition module, for being verified in a manner of iris;With
Second checking input unit, is verified for the second verification mode in a manner of different from iris;
The processor is additionally operable to when the environmental information reaches default verification condition, performs iris verification;And use When in the environmental information not up to default verification condition, the checking of the second verification mode is performed.
The terminal of embodiment of the present invention, including housing, processor, memory, circuit board, power circuit, ambient light pass Sensor and at least two checking input units, it is characterised in that at least two checkings input unit includes the first checking input dress Put includes iris recognition module with the second checking input unit, the first checking input unit, and the circuit board is placed in institute The interior volume that housing surrounds is stated, the processor and the memory are arranged on the circuit board;The power circuit, use In each circuit or the device power supply for the terminal;The memory is used to store executable program code;The processor Program corresponding with the executable program code is run by reading the executable program code stored in the memory, For performing above-mentioned verification method.
The computer-readable recording medium of embodiment of the present invention, have and be stored in instruction therein, when the processing of terminal When device performs the instruction, the terminal performs above-mentioned verification method.
The verification mode and terminal of embodiment of the present invention, when iris recognition is limited by ambient brightness, open other and test Card pattern verified, one reduces the probability that iris recognition fails because being restricted, and improves Consumer's Experience, two is various other Verification mode, add the flexibility of terminal authentication and improve security.
The additional aspect and advantage of the present invention will be set forth in part in the description, and will partly become from the following description Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention is from combining in description of the accompanying drawings below to embodiment by change Obtain substantially and be readily appreciated that, wherein:
Fig. 1 is the schematic flow sheet of the verification method of embodiment of the present invention.
Fig. 2 is the structural representation of the electronic installation of embodiment of the present invention.
Fig. 3 is the schematic diagram of a scenario of the verification method of some embodiments of the present invention.
Fig. 4 is the schematic flow sheet of the verification method of some embodiments of the present invention.
Fig. 5 is the schematic flow sheet of the verification method of some embodiments of the present invention.
Fig. 6 is the schematic flow sheet of the verification method of some embodiments of the present invention.
Embodiment
Embodiments of the present invention are described below in detail, the example of the embodiment is shown in the drawings, wherein identical Or similar label represents same or similar element or the element with same or like function from beginning to end.Below by ginseng The embodiment for examining accompanying drawing description is exemplary, is only used for explaining embodiments of the present invention, and it is not intended that to this hair The limitation of bright embodiment.
Fig. 1 and Fig. 2 are referred to, the verification method of the terminal of embodiment of the present invention, is comprised the following steps:
S10:Obtain environmental information;
S20:Judge whether environmental information reaches default verification condition;
S30:If so, then verified by the iris recognition module;With
S40:If it is not, verified by the described second checking input unit.
The terminal 1000 of embodiment of the present invention includes ambient light sensor, at least two checking input units and processor 200, at least two checking input units include the first checking input unit and the second checking input unit, the first checking input unit Including iris recognition module 100.Iris recognition module 100 includes infrared camera 110 and infrared light supply 120.Infrared camera 110 infrared lights for being used to receive the transmitting of infrared light supply 120 as efficient light sources are in the reflection light of iris to form iris figure Picture.For being verified in a manner of iris, the second checking input unit is used in a manner of different irises iris recognition module 100 Second verification mode is verified.As an example, the verification method of embodiment of the present invention, can be by the terminal of embodiment of the present invention 1000 realize, and are applied to terminal 1000.
Wherein, step S10 can be realized by ambient light sensor, and step S20 to step S40 can be real by processor 200 It is existing.In other words, ambient light sensor is used to obtain the environmental information around terminal 1000, and processor 200 is used to judge ring Whether environment information reaches default verification condition, and when environmental information reaches default verification condition, control iris recognition module 100 is opened Execution iris verification is opened, in environmental information not up to default verification condition, the checking input unit of control second, which is opened, performs the Two verification modes are verified.
Iris recognition module 100 is generally used for that the identity of the user of currently used electronic installation 1000 is identified, because This iris recognition module 100 is generally preposition, namely is provided in the preceding surface of electronic installation 1000, such as is arranged at preceding surface top End.Iris recognition module 100 is arranged in the housing of electronic installation 1000 and exposed from preceding surface.Preceding surface that is to say that electronics fills Put 1000 be used for show a side surface, in other words, in use towards the side surface of user.
Processor 200 can be CPU, GPU of electronic installation and any combination of independent image processor.
With the lifting of personal information security importance, such as mobile phone of terminal 1000 is provided with a variety of verification modes, such as Pattern or numerical ciphers, fingerprint recognition, iris recognition etc., the various various pros and cons of mode, wherein iris recognition is due to iris information With uniqueness, and not transreplication, security are higher than other verification modes, thus are increasingly favored.
However, the applicable situation of iris recognition is limited, it will be understood that infrared camera more than 110 used in iris recognition For being shot in half-light, thus in half-light environment identification there is no problem, but in strong light environment recognition speed and into Power all can be reduced substantially.
Referring to Fig. 3, the control method of embodiment of the present invention is when terminal 1000 needs to carry out authentication, it is logical first The environmental information crossed around ambient light sensor detection, that is to say ambient brightness, default verification condition can be that ambient brightness is It is no to be less than or equal to predetermined threshold, when reaching default verification condition and that is to say that ambient brightness is less than or equal to predetermined threshold, open Open iris recognition module 100, and that is to say in not up to default verification condition and the is opened when ambient brightness is more than predetermined threshold Two checking input units.Judge that current light condition is unsuitable for iris recognition when ambient brightness is more than predetermined threshold, now open Opening other verification modes is supplied to user to be verified.Can reduce user under strong light using iris recognition and caused by fail or Success rate reduce, and caused by temporal unnecessary consumption.In addition, the power consumption of iris recognition module 100 is higher, what is do not applied to In the case of open other verification modes, higher power dissipation caused by opening iris recognition module 100 can be avoided.
Checking scene includes but is not limited to be unlocked terminal 1000, pay etc. using terminal 1000.
Wherein, during iris recognition, Iris Location is carried out first, can be by extracting the inner boundary and external boundary of iris Realize the positioning to iris.Wherein, the extraction of inner boundary is the grey level histogram by calculating view picture iris image, due to ash Degree histogram have two major peaks, be corresponding to first peak value pupil region gray scale concentrate scope, second peak value pair What is answered is the scope that iris region gray scale is concentrated, and therefore, a binary-state threshold is chosen on the right side of first peak value and to rainbow Film image may separate out pupil to extract inner circle border after carrying out binary conversion treatment.The extraction on cylindrical border can use The method of Hough transform.Edge extracting is carried out to iris image first by Canny operators, then use can be detected and had The Hough transform of shaped objects undetermined determines the fringing coefficient of iris to extract cylindrical border.After determining inside and outside circle border Determine annular iris position.Then, the iris after positioning is normalized and image enhancement processing.Wherein, normalize Processing is that various sizes of iris texture is changed into the region of fixed size by certain mapping (such as polarization coordinate), so as to disappear Except the influence of translation, rotation, scaling to iris recognition.Image enhancement processing is by partial histogram equalization, that is, is passed through a little Computing makes the annular iris image after positioning be converted to the image for having same pixel point to export in each gray level, so as to change It is kind due to uneven illumination it is even caused by picture contrast after normalization it is low the problem of.Then, to normalization and image enhaucament Iris image after reason carries out feature extraction and coding.Specifically, wavelet transformation can be used to carry out feature extraction to iris image. 2D Gabor functions can form the small echo of one group of self similarity by scaling, rotation and translation.By 2D Gabor functions and iris The pixel of image is multiplied and integration can produce a series of wavelet coefficients, so as to extract image texture i.e. iris feature information.Coding Refer to carrying out wavelet coefficient Zero-code to obtain a series of binary coding numerical value.Finally by after feature extraction and coding Iris feature information compared with the iris feature information to prestore, specifically, by the feature coding of iris image with prestoring The feature coding of iris feature information match one by one so as to determine whether identical iris.The matching of feature coding can use sea It is bright away from matching algorithm:
Wherein, Ai、BiRepresent that the i-th bit code of the feature coding of iris image and the feature of the iris feature information to prestore are compiled respectively The i-th bit code of code, L are characterized the length of coding.To AiAnd BiAfter carrying out XOR processing, obtained HD value is smaller, iris image Feature coding and the feature coding of the iris feature information to prestore matching degree it is higher.In this way, it can determine whether that iris feature is believed Cease and that is to say whether the iris information of authorized user matches between the iris feature information to prestore, be considered as iris in matching Identify successfully and determine that the personage is authorized user, and what it fails to match is then defined as unauthorized user.
In summary, the verification mode of embodiment of the present invention and terminal 1000, are limited in iris recognition by ambient brightness When, open other Validation Modes and verified, one reduces the probability that iris recognition fails because being restricted, and improves user's body Test, two various other verification modes, add the flexibility of terminal authentication and improve security.
In some embodiments, electronic installation 1000 includes mobile phone, tablet personal computer, notebook computer, intelligent watch, intelligence Energy bracelet, intelligent helmet, intelligent glasses etc..
In some embodiments, the second checking input unit includes fingerprint recognition module, recognition of face module, dynamic mouth Make the one or more combination of device, short-message verification device or password authentication device.
In this way, fingerprint recognition module, recognition of face module, dynamic password apparatus, short-message verification device or password authentification dress Checking input can be provided in iris recognition module 100 is using limited scene by putting.
It is appreciated that fingerprint recognition module verifies the identity of user by verifying the fingerprint of user.Specifically, fingerprint is known The fingerprint image of other module collection user simultaneously compares the fingerprint of user with the fingerprint image to prestore, when the fingerprint image collected Then it is verified when consistent with the fingerprint image to prestore.
Recognition of face module is typically to utilize front camera, obtains the image of face.Specifically, recognition of face is carried out When, Face datection, pretreatment and feature information extraction need to be carried out to image.Wherein, Face datection is to detect that face part exists The position of image, the face classification device trained can be used to be detected.Facial image pretreatment is referred to face figure As carrying out the processing such as light compensation, greyscale transformation, histogram equalization, normalization, geometric correction, filtering and sharpening, so as to Eliminate the influence of illumination, noise etc..The process that feature modeling is carried out to face that feature information extraction refers to.The characteristic information of face Extraction generally includes Knowledge based engineering characterizing method and two kinds of extracting methods of characterizing method based on algebraic characteristic or statistical learning. In some instances, Knowledge based engineering characterizing method can be used to carry out face characteristic information extraction.Knowledge based engineering characteristic present Method mainly contributes to face classification according to the distance between the shape description of human face and each organ characteristic to obtain Characteristic, its characteristic component generally includes Euclidean distance, curvature and angle between characteristic point etc..By to eye in face The geometric description of structural relation between the local feature of the organs such as eyeball, nose, face, chin and each organ, you can extract Face characteristic information.After face characteristic information is extracted, by the face characteristic information of extraction and the people of the authorized user to prestore Face characteristic information is compared, and thinks to be verified when both similarities exceed preset value.
Dynamic password apparatus is then to verify the identity of user by verifying dynamic password.Specifically, tested in user During card operation, a dynamic password is exported by a certain specific electronic devices, if verifying dynamic password device detects that user is defeated The dynamic password entered is consistent with the dynamic password that specific electronic devices export, then is verified.
Short-message verification device verifies the identity of user by verifying short message.Specifically, when user carries out verification operation, Information platform sends identifying code short message to default phone number, and user inputs identifying code to short-message verification according to short message Device, if short-message verification device detects that the identifying code of user's input is consistent with identifying code short message, it is verified.
Password authentication device is by verifying the identity of password authentification user.Specifically, the predeterminable numeral of user or figure Case password, when carrying out verification operation, password is inputted, when password authentication device detects that the password of input and default checking are close When code is consistent, then it is verified.
Certainly, in other embodiments, the second checking input unit is not limited to mentioned kind, for example, gesture checking dress Put, audio authentication device etc..
Referring to Fig. 4, in some embodiments, step S40 comprises the following steps:
S42:Iris recognition module is closed or remained turned-off when environmental information not up to default verification condition and opens the Two checking input units.
In some embodiments, step S42 can be realized by processor 200.In other words, processor 200 is used to work as ring The not up to default verification condition of environment information is closed or remained turned-off iris recognition module 100 and opens the second checking input unit.
Specifically, when ambient light is unsuitable for carrying out iris recognition, close iris recognition module 100 and open other and test Card mode, the security of checking was both ensure that, and turn avoid power consumption mistake caused by unlatching iris recognition module 100 for a long time Greatly.If iris recognition module 100 is in opening, it is turned off, if iris recognition module 100 is closed, Remain off.
Referring to Fig. 5, in some embodiments, step is included before step S10:
S02:Judge whether system time falls into predetermined amount of time according to the system time of terminal;With
S04:Enter step S10 when system time section falls into predetermined amount of time.
In some embodiments, step S00 and step S02 can be realized by processor 200.In other words, processing 200 is used In judging whether system time falls into predetermined amount of time according to the system time of terminal 1000, when system time section falls into pre- timing Between section when environmental information obtained by ambient light sensor.
It is appreciated that usually, when system time is in special noon section on daytime, now outdoor ambient brightness leads to It is often higher, therefore within such period, in other words ambient brightness is more than when environmental information not up to presets verification condition The possibility of predetermined threshold is higher, now can detect ambient brightness first before iris recognition is carried out.
And when system time is outside predetermined amount of time, it is believed that iris recognition module 100 can be applicable, thus can be with Without obtaining ambient brightness, the amount of calculation of processing is reduced.
System time can be gone over by reading system clock, also can obtain system time by internet.
Referring to Fig. 6, further, in such embodiment, step is included before step S02:
S00:Judge whether terminal is located at precalculated position according to the positional information of terminal;With
S01:Judge whether system time falls into pre- timing according to the system time of terminal when terminal is located at precalculated position Between section.
In such embodiment, step S00 and step S01 can be realized by processor 200.In other words, processor 200 are used to judge whether terminal 1000 is located at precalculated position according to the positional information of terminal 1000, in terminal 1000 positioned at predetermined Judge whether system time falls into predetermined amount of time according to the system time of terminal 1000 during position.
Specifically, therefore, can be first before system time is obtained because the photoenvironment of indoor and outdoors differs greatly The position of detection terminal 1000, positional information can be positioned by modes such as GPS, usually, know that terminal 1000 is located at room roughly Outer or outdoor, when being located outside can further detecting system time, when falling into predetermined amount of time, further detect Ambient brightness is to decide whether to open iris recognition module 100.
And in terminal 1000 not in precalculated position, that is to say positioned at it is indoor when be believed that iris recognition pattern under current environment 100 can be applicable, thus can not have to obtain system time and ambient brightness, reduce the amount of calculation of processing.
The terminal of embodiment of the present invention includes housing, processor, memory, circuit board, power circuit, ambient light sensing Device and at least two checking input units.At least two checking input units include the first checking input unit and the second checking input dress Put, the first checking input unit includes iris recognition module.Circuit board is placed in the interior volume that housing surrounds, and processor and deposits Reservoir is set on circuit boards.Power circuit is used to power for each circuit or device of terminal.Memory is used to store and can hold Line program code.The executable program code that processor is stored by reading in memory is run and executable program code pair The program answered is to realize the verification method of above-mentioned any embodiment of the present invention.In the process, processor be used for perform with Lower step:
Judge whether environmental information reaches default verification condition;
Verified when environmental information reaches default verification condition by iris recognition module;With
Verified when environmental information reaches default verification condition by the second checking input unit.
In some embodiments, processor is used to perform following steps:
Iris recognition module, which is closed or remained turned-off, when environmental information not up to default verification condition and opens second tests Demonstrate,prove input unit.
In some embodiments, processor is used to perform following steps:
Judge whether system time falls into predetermined amount of time according to the system time of terminal;With
The environmental information is obtained when the system time section falls into the predetermined amount of time.
In some embodiments, processor is used to perform following steps:
Judge whether terminal is located at precalculated position according to the positional information of terminal;With
Judge whether system time falls into predetermined amount of time according to the system time of terminal when terminal is located at precalculated position.
It should be noted that the foregoing explanation to verification method and terminal 1000 is also applied for embodiment of the present invention Terminal, here is omitted.
The computer-readable recording medium of embodiment of the present invention, have and be stored in instruction therein, when the processing of terminal During device execute instruction, terminal performs the verification method of embodiment of the present invention, the foregoing explanation to verification method and terminal 1000 Illustrate the computer-readable recording medium for being also applied for embodiment of the present invention, here is omitted.
In summary, the electronic installation and computer-readable recording medium of embodiment of the present invention, in iris recognition by ring During border brightness limitation, open other Validation Modes and verified, one reduces the probability that iris recognition fails because being restricted, and changes Kind Consumer's Experience, two various other verification modes, adds the flexibility of terminal authentication and improves security.
In the description of embodiments of the present invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " length Degree ", " width ", " thickness ", " on ", " under ", "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom ", " interior ", The orientation or position relationship of the instruction such as " outer ", " clockwise ", " counterclockwise " are based on orientation shown in the drawings or position relationship, only It is to be described for the ease of description embodiments of the present invention with simplified, rather than indicates or imply that the device of meaning or element are necessary With specific orientation, with specific azimuth configuration and operation, therefore it is not intended that limitation to embodiments of the present invention.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or Implicitly include one or more feature.In the description of embodiments of the present invention, " multiple " are meant that two Individual or two or more, unless otherwise specifically defined.
, it is necessary to illustrate in the description of embodiments of the present invention, unless otherwise clearly defined and limited, term " installation ", " connected ", " connection " should be interpreted broadly, for example, it may be fixedly connected or be detachably connected, or one Connect body;It can be mechanical connection or electrical connection or can mutually communicate;Can be joined directly together, can also lead to Cross intermediary to be indirectly connected, can be connection or the interaction relationship of two elements of two element internals.For ability For the those of ordinary skill in domain, it can understand that above-mentioned term in embodiments of the present invention specific contains as the case may be Justice.
In embodiments of the present invention, unless otherwise clearly defined and limited, fisrt feature second feature it " on " or it " under " can directly be contacted including the first and second features, it is not directly to connect that can also include the first and second features Touch but pass through the other characterisation contact between them.Moreover, fisrt feature second feature " on ", " top " and " on Face " includes fisrt feature directly over second feature and oblique upper, or to be merely representative of fisrt feature level height special higher than second Sign.Fisrt feature second feature " under ", " lower section " and " below " include fisrt feature immediately below second feature and tiltedly under Side, or be merely representative of fisrt feature level height and be less than second feature.
Above disclosure provides many different embodiments or example is used for realizing embodiments of the present invention not Same structure.In order to simplify the disclosure of embodiments of the present invention, above the part and setting of specific examples are described.When So, they are only example, and purpose does not lie in the limitation present invention.In addition, embodiments of the present invention can be in different examples Repeat reference numerals and/or reference letter in son, this repetition are for purposes of simplicity and clarity, itself not indicate to be begged for By the relation between various embodiments and/or setting.In addition, the various specific techniques that embodiments of the present invention provide With the example of material, but those of ordinary skill in the art can be appreciated that the application of other techniques and/or making for other materials With.
In the description of this specification, reference term " embodiment ", " some embodiments ", " schematically implementation The description of mode ", " example ", " specific example " or " some examples " etc. means the tool with reference to the embodiment or example description Body characteristicses, structure, material or feature are contained at least one embodiment or example of the present invention.In this manual, Identical embodiment or example are not necessarily referring to the schematic representation of above-mentioned term.Moreover, the specific features of description, knot Structure, material or feature can combine in an appropriate manner in any one or more embodiments or example.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system including the system of processing module or other can be from instruction The system of execution system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or Equipment and use.For the purpose of this specification, " computer-readable medium " can be it is any can include, store, communicating, propagating or Transmission program uses for instruction execution system, device or equipment or with reference to these instruction execution systems, device or equipment Device.The more specifically example (non-exhaustive list) of computer-readable medium includes following:With one or more wiring Electrical connection section (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium, which can even is that, to print the paper of described program thereon or other are suitable Medium, because can then enter edlin, interpretation or if necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of embodiments of the present invention can be with hardware, software, firmware or combinations thereof come real It is existing.In the above-described embodiment, multiple steps or method can use storage in memory and by suitable instruction execution system The software or firmware of execution is realized.If for example, being realized with hardware, with another embodiment, ability can be used Any one of following technology known to domain or their combination are realized:With for realizing logic function to data-signal The discrete logic of logic gates, there is the application specific integrated circuit of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing module, also may be used To be that unit is individually physically present, can also two or more units be integrated in a module.It is above-mentioned integrated Module can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module If realized in the form of software function module and as independent production marketing or in use, a calculating can also be stored in In machine read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art within the scope of the invention can be to above-mentioned Embodiment is changed, changed, replacing and modification.

Claims (11)

1. a kind of verification method, applied to terminal, it is characterised in that the terminal includes at least first checking input unit and the Two checking input units, the first checking input unit include iris recognition module, and the verification method comprises the following steps:
Obtain environmental information;
Judge whether environmental information reaches default verification condition;
If so, then verified by the iris recognition module;With
If it is not, verified by the described second checking input unit.
2. verification method as claimed in claim 1, it is characterised in that described to be tested by the described second checking input unit The step of card, includes:
Close when the environmental information is not up to the default verification condition or remain turned-off the iris recognition module and open Open the second checking input unit.
3. verification method as claimed in claim 1, it is characterised in that also included step before described the step of obtaining environmental information Suddenly:
Judge whether the system time falls into predetermined amount of time according to the system time of the terminal;With
The environmental information is obtained when the system time section falls into the predetermined amount of time.
4. verification method as claimed in claim 3, it is characterised in that the system time according to the terminal judges the system The step of whether the system time falls into predetermined amount of time also includes step:
Judge whether the terminal is located at precalculated position according to the positional information of the terminal;With
Judge whether the system time falls according to the system time of the terminal when the terminal is located at the precalculated position Enter predetermined amount of time.
5. a kind of terminal, it is characterised in that the terminal includes:
Ambient light sensor, for obtaining the environmental information around the terminal;
Processor, for judging whether the environmental information reaches default verification condition;
Iris recognition module, for being verified in a manner of iris;With
Second checking input unit, is verified for the second verification mode in a manner of different from iris;
The processor is additionally operable to when the environmental information reaches default verification condition, performs iris verification;And for When the environmental information not up to presets verification condition, the checking of the second verification mode is performed.
6. terminal as claimed in claim 5, it is characterised in that it is described second checking input unit include fingerprint recognition module, One or more combinations in recognition of face module, dynamic password apparatus, short-message verification device or password authentication device.
7. terminal as claimed in claim 5, it is characterised in that the processor is used for:
Close when the environmental information reaches the default verification condition or remain turned-off the iris recognition module and open The second checking input unit.
8. terminal as claimed in claim 5, it is characterised in that the processor is used for:
Judge whether the system time falls into predetermined amount of time according to the system time of the terminal;With
The environmental information is obtained when the system time section falls into the predetermined amount of time.
9. terminal as claimed in claim 8, it is characterised in that the processor is used for:
Judge whether the terminal is located at precalculated position according to the positional information of the terminal;With
Judge whether the system time falls according to the system time of the terminal when the terminal is located at the precalculated position Enter predetermined amount of time.
10. a kind of terminal, it is characterised in that including housing, processor, memory, circuit board, power circuit, ambient light sensing Device and at least two checking input units, it is characterised in that at least two checkings input unit includes the first checking input unit With the second checking input unit, the first checking input unit includes iris recognition module, and the circuit board is placed in described The interior volume that housing surrounds, the processor and the memory are arranged on the circuit board;The power circuit, is used for Powered for each circuit or device of the terminal;The memory is used to store executable program code;The processor leads to Cross and read the executable program code that is stored in the memory to run program corresponding with the executable program code, with For performing the verification method as any one of Claims 1-4.
11. a kind of computer-readable recording medium, have and be stored in instruction therein, when instruction described in the computing device of terminal When, the verification method in the terminal perform claim requirement 1 to 4 described in any one.
CN201710534750.0A 2017-07-03 2017-07-03 Verification method and terminal Active CN107465809B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710534750.0A CN107465809B (en) 2017-07-03 2017-07-03 Verification method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710534750.0A CN107465809B (en) 2017-07-03 2017-07-03 Verification method and terminal

Publications (2)

Publication Number Publication Date
CN107465809A true CN107465809A (en) 2017-12-12
CN107465809B CN107465809B (en) 2020-12-04

Family

ID=60544168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710534750.0A Active CN107465809B (en) 2017-07-03 2017-07-03 Verification method and terminal

Country Status (1)

Country Link
CN (1) CN107465809B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107613550A (en) * 2017-09-27 2018-01-19 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN108038358A (en) * 2017-12-21 2018-05-15 维沃移动通信有限公司 The authorization method and device of mobile terminal
CN108062465A (en) * 2017-12-14 2018-05-22 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN108363916A (en) * 2018-02-28 2018-08-03 上海爱优威软件开发有限公司 A kind of identification processing method and system
CN108875352A (en) * 2018-06-26 2018-11-23 维沃移动通信有限公司 Verification method, device and the mobile terminal of user identity
CN109753899A (en) * 2018-12-21 2019-05-14 普联技术有限公司 A kind of face identification method, system and equipment
US11625473B2 (en) 2018-02-14 2023-04-11 Samsung Electronics Co., Ltd. Method and apparatus with selective combined authentication

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662554A (en) * 2012-01-09 2012-09-12 联想(北京)有限公司 Information processing apparatus and code input mode switching method thereof
CN103761463A (en) * 2014-01-13 2014-04-30 联想(北京)有限公司 Information processing method and electronic device
CN103927018A (en) * 2014-04-28 2014-07-16 联想(北京)有限公司 Control method and device and electronic equipment
CN105590045A (en) * 2015-09-14 2016-05-18 ***股份有限公司 Environmental self-adaptation identity authentication method and terminal
CN105718922A (en) * 2016-03-04 2016-06-29 北京天诚盛业科技有限公司 Adaptive regulation method and device for iris identification
US20160234024A1 (en) * 2015-02-11 2016-08-11 Sensory, Incorporated Leveraging Multiple Biometrics For Enabling User Access To Security Metadata
CN106295492A (en) * 2016-06-03 2017-01-04 北京奇虎科技有限公司 A kind of terminal processing method, device and mobile terminal
CN106295626A (en) * 2016-09-27 2017-01-04 普瑞斯康(北京)健康管理有限公司 Iris lens, iris filming apparatus and iris analysis method
CN106537412A (en) * 2014-06-10 2017-03-22 虹膜技术公司 Hand-attachable wearable device capable of iris identification indoors and outdoors
CN106572237A (en) * 2016-10-10 2017-04-19 上海斐讯数据通信技术有限公司 Screen control method and device of mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662554A (en) * 2012-01-09 2012-09-12 联想(北京)有限公司 Information processing apparatus and code input mode switching method thereof
CN103761463A (en) * 2014-01-13 2014-04-30 联想(北京)有限公司 Information processing method and electronic device
CN103927018A (en) * 2014-04-28 2014-07-16 联想(北京)有限公司 Control method and device and electronic equipment
CN106537412A (en) * 2014-06-10 2017-03-22 虹膜技术公司 Hand-attachable wearable device capable of iris identification indoors and outdoors
US20160234024A1 (en) * 2015-02-11 2016-08-11 Sensory, Incorporated Leveraging Multiple Biometrics For Enabling User Access To Security Metadata
CN105590045A (en) * 2015-09-14 2016-05-18 ***股份有限公司 Environmental self-adaptation identity authentication method and terminal
CN105718922A (en) * 2016-03-04 2016-06-29 北京天诚盛业科技有限公司 Adaptive regulation method and device for iris identification
CN106295492A (en) * 2016-06-03 2017-01-04 北京奇虎科技有限公司 A kind of terminal processing method, device and mobile terminal
CN106295626A (en) * 2016-09-27 2017-01-04 普瑞斯康(北京)健康管理有限公司 Iris lens, iris filming apparatus and iris analysis method
CN106572237A (en) * 2016-10-10 2017-04-19 上海斐讯数据通信技术有限公司 Screen control method and device of mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107613550A (en) * 2017-09-27 2018-01-19 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN108062465A (en) * 2017-12-14 2018-05-22 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN108038358A (en) * 2017-12-21 2018-05-15 维沃移动通信有限公司 The authorization method and device of mobile terminal
US11625473B2 (en) 2018-02-14 2023-04-11 Samsung Electronics Co., Ltd. Method and apparatus with selective combined authentication
CN108363916A (en) * 2018-02-28 2018-08-03 上海爱优威软件开发有限公司 A kind of identification processing method and system
CN108875352A (en) * 2018-06-26 2018-11-23 维沃移动通信有限公司 Verification method, device and the mobile terminal of user identity
CN108875352B (en) * 2018-06-26 2020-09-01 维沃移动通信有限公司 User identity verification method and device and mobile terminal
CN109753899A (en) * 2018-12-21 2019-05-14 普联技术有限公司 A kind of face identification method, system and equipment

Also Published As

Publication number Publication date
CN107465809B (en) 2020-12-04

Similar Documents

Publication Publication Date Title
CN107465809A (en) Verification method and terminal
CN109886697B (en) Operation determination method and device based on expression group and electronic equipment
Galbally et al. Three‐dimensional and two‐and‐a‐half‐dimensional face recognition spoofing using three‐dimensional printed models
WO2016172872A1 (en) Method and device for verifying real human face, and computer program product
CN103324909B (en) Facial feature detection
US20140044320A1 (en) Texture features for biometric authentication
EP3825905A1 (en) Method and apparatus with liveness test and/or biometric authentication, computer program therefore and medium storing the same
US10922399B2 (en) Authentication verification using soft biometric traits
CN106296950A (en) A kind of gate control system based on recognition of face
CN101558431A (en) Face authentication device
CN102509053A (en) Authentication and authorization method, processor, equipment and mobile terminal
US11348364B2 (en) Method and system for neural fingerprint enhancement for fingerprint recognition
CN111881429A (en) Activity detection method and apparatus, and face verification method and apparatus
Li et al. An accurate and efficient user authentication mechanism on smart glasses based on iris recognition
CN108074303A (en) A kind of scheme that can expand recognition of face number of users
CN107395862B (en) Incoming call processing method, electronic device and computer readable storage medium
CN111339885B (en) User identity determining method and related device based on iris recognition
Abdullah et al. Smart card with iris recognition for high security access environment
Anthony et al. A review of face anti-spoofing methods for face recognition systems
CN112580472A (en) Rapid and lightweight face recognition method and device, machine readable medium and equipment
Debiasi et al. Near-infrared illumination add-on for mobile hand-vein acquisition
KR20210031349A (en) Authentication method and device through face recognition
CN107395865A (en) Pushed information processing method and electronic installation
CN107368726A (en) The unlocking method and terminal of terminal
KR102197334B1 (en) Method for verifying Identification card using neural network and server for the method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant