CN108133129A - A kind of unlocking method of application program, device and mobile terminal - Google Patents

A kind of unlocking method of application program, device and mobile terminal Download PDF

Info

Publication number
CN108133129A
CN108133129A CN201710483395.9A CN201710483395A CN108133129A CN 108133129 A CN108133129 A CN 108133129A CN 201710483395 A CN201710483395 A CN 201710483395A CN 108133129 A CN108133129 A CN 108133129A
Authority
CN
China
Prior art keywords
user
human face
face photo
application program
unique mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710483395.9A
Other languages
Chinese (zh)
Inventor
陈强
丰亚会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Net Gold Cloud Computing Co Ltd
Original Assignee
Guangdong Net Gold Cloud Computing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Net Gold Cloud Computing Co Ltd filed Critical Guangdong Net Gold Cloud Computing Co Ltd
Priority to CN201710483395.9A priority Critical patent/CN108133129A/en
Publication of CN108133129A publication Critical patent/CN108133129A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Hardware Design (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to a kind of unlocking method of application program, device and mobile terminals.This method includes:Step S1, the unlocking signal triggered by user is received, and obtains the unique mark of the user;Step S2, the facial image of the user is obtained by camera, and the human face photo of facial image identity card corresponding with the unique mark is compared;Step S3, when the similarity of comparison result is greater than or equal to predetermined threshold value, into the unlocking successfully of the application program after operation interface.The present invention compares identity card picture by recognition of face and authentication is identified, and similarity, which reaches, more than predetermined threshold value can just be unlocked, so as to ensure that only I could successfully enter in application program.

Description

A kind of unlocking method of application program, device and mobile terminal
Technical field
The present invention relates to computer programs, and in particular to the unlocking technology of application program.
Background technology
The scheme overwhelming majority of application program (APP) unlock currently on the market is the unlock of nine grids gesture password, number The unlocked by fingerprint of password unlock, character password lock and iPhone5s, more than ios8.0.Pass through nine grids, password, character string etc. The mode of unlock into APP are relatively simple, and password is easily revealed or stolen a glance at by people and is easy to be remembered by other people, causes APP contents Information leakage.
Invention content
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of unlock sides of application program Method can solve the problems, such as that other people easily crack unlocking pin.
The second object of the present invention is to provide a kind of tripper of application program, can solve other people and easily crack solution The problem of lock cipher.
The third object of the present invention is to provide a kind of mobile terminal, can solve other people and easily crack asking for unlocking pin Topic.
One of to achieve these goals, the technical solution adopted in the present invention is as follows:
A kind of unlocking method of application program, includes the following steps:
Step S1, the unlocking signal triggered by user is received, and obtains the unique mark of the user;
Step S2, the facial image of the user is obtained by camera, and by the facial image and unique mark The human face photo for knowing corresponding identity card is compared;
Step S3, when the similarity of comparison result is greater than or equal to predetermined threshold value, into the unlock of the application program Operation interface after success.
Preferably, there are following steps between step S1 and step S2:
Whether the unique mark for step S101, judging to trigger the user of unlocking signal has been associated with corresponding human face photo, if It is then to perform step S2, otherwise, performs step S102;
Step S102, the identity card picture of the user is obtained, human face photo is extracted from the identity card picture, and will The unique mark of the user is associated preservation, return to step S1 with human face photo.The human face photo is stored in cloud service Device.
Preferably, the predetermined threshold value is 75%.
Preferably, the step S3 is further included:When the similarity of comparison result is less than predetermined threshold value, display unlock failure Information, and return to step S1.
To achieve these goals two, the technical solution adopted in the present invention is as follows:
A kind of tripper of application program, including with lower module:
Receiving module for receiving the unlocking signal triggered by user, and obtains the unique mark of the user;
Comparing module, for passing through the facial image that camera obtains the user, and by the facial image with it is described The human face photo of the corresponding identity card of unique mark is compared;
Unlocked state, for when the similarity of comparison result be greater than or equal to predetermined threshold value when, into the application program Unlock successfully after operation interface.
Preferably, there are following steps between receiving module and comparing module:
Judgment module, whether the unique mark for judging to trigger the user of unlocking signal, which has been associated with corresponding face, shines Piece if so, performing comparing module, otherwise, performs binding module;
For obtaining the identity card picture of the user, human face photo is extracted from the identity card picture for binding module, And the unique mark of the user and human face photo are associated preservation, return to receiving module.
Preferably, the predetermined threshold value is 75%.
Preferably, the unlocked state further includes:When the similarity of comparison result is less than predetermined threshold value, display unlock is lost Information is lost, and returns to receiving module.
To achieve these goals three, the technical solution adopted in the present invention is as follows:
A kind of mobile terminal, including memory and processor;
The memory, for storing program instruction;
The processor, for running described program instruction, to perform the unlocking method of application program as described above Step.
Compared with prior art, the beneficial effects of the present invention are:
Identity card picture is compared by recognition of face, authentication is identified, similarity, which reaches, more than predetermined threshold value can just carry out Unlock, so as to ensure that only I could successfully enter in application program.
Description of the drawings
Fig. 1 is the flow chart of the unlocking method of the application program of the embodiment of the present invention one;
Fig. 2 is the structure diagram of the tripper of the application program of the embodiment of the present invention two;
Fig. 3 is the structure diagram of the mobile terminal of the embodiment of the present invention three.
Specific embodiment
In the following, with reference to attached drawing and specific embodiment, the present invention is described further:
Embodiment one
As shown in Figure 1, a kind of unlocking method of application program, includes the following steps:
Step S11, the unlocking signal triggered by user is received, and obtains the unique mark of the user.
This step is specifically, and user is by inputting username and password, login application program, user can by clicking or Specified region triggering unlock is touched, application program receives unlocking signal, and obtains the unique mark of the user, unique mark Know can be user name, the user finger print information etc..
Whether the unique mark for step S12, judging to trigger the user of unlocking signal has been associated with corresponding human face photo, if It is then to perform step S14, otherwise, performs step S13.
This step binds user name with identity card picture for judging whether user had carried out real-name authentication.
Step S13, the identity card picture of the user is obtained, human face photo is extracted from the identity card picture, and will The unique mark of the user is associated preservation, return to step S11 with human face photo.
This step is specifically, by opening camera, to shoot the identity card of the user, people is then extracted from identity card Face photo, and human face photo and user are subjected to binding preservation.The human face photo can be stored in Cloud Server or local.
Step S14, the facial image of the user is obtained by camera, and by the facial image and unique mark The human face photo for knowing corresponding identity card is compared.
This step is specifically that, by the user of real-name authentication, can directly be compared, that is, shoots head captured in real-time and use Then the face at family transfers the human face photo of corresponding identity card, then to obtain facial image according to the unique mark of user Face picture is compared with human face photo, which can be specifically the aspect ratios pair such as nose, eyes, face, and obtain Comparison result.
Step S15, judge whether the similarity of comparison result is greater than or equal to predetermined threshold value, if so, entering described answer With the operation interface after the unlocking successfully of program, otherwise, display unlock failure information, and return to step S11.
It is verified by test, predetermined threshold value is set as 75%, is optimal solution.
Embodiment two
The present embodiment proposes a kind of virtual bench for the method for realizing embodiment one, the solution of specifically a kind of application program Locking device, including with lower module:
Receiving module for receiving the unlocking signal triggered by user, and obtains the unique mark of the user;
Judgment module, whether the unique mark for judging to trigger the user of unlocking signal, which has been associated with corresponding face, shines Piece if so, performing comparing module, otherwise, performs binding module;
For obtaining the identity card picture of the user, human face photo is extracted from the identity card picture for binding module, And the unique mark of the user and human face photo are associated preservation, return to receiving module;
Comparing module, for passing through the facial image that camera obtains the user, and by the facial image with it is described The human face photo of the corresponding identity card of unique mark is compared;
Unlocked state, for when the similarity of comparison result be greater than or equal to predetermined threshold value when, into the application program Unlock successfully after operation interface, when the similarity of comparison result is less than predetermined threshold value, display unlock failure information and returns Return receiving module.
Embodiment three
The present embodiment proposes a kind of entity apparatus for the method for realizing embodiment one, specifically a kind of mobile terminal, Including memory and processor, the memory, for storing program instruction;The processor refers to for running described program It enables, the step of to perform the unlocking method of application program as described in embodiment one.
The scheme of the various embodiments described above, with reference to recognition of face, using unlock etc. Functional Designs, be to first nine grids, A kind of extension of 4-6 bit digitals password or the mode of character string password unlock, it is more more safe and reliable than these types of mode. Only I carries out face scan by mobile equipment, and the success of matching characteristic point can just enter normal operating circle of application program Face.
It will be apparent to those skilled in the art that technical solution that can be as described above and design, make other various Corresponding change and deformation, and all these changes and deformation should all belong to the protection domain of the claims in the present invention Within.

Claims (10)

1. a kind of unlocking method of application program, which is characterized in that include the following steps:
Step S1, the unlocking signal triggered by user is received, and obtains the unique mark of the user;
Step S2, the facial image of the user is obtained by camera, and by the facial image and the unique mark pair The human face photo for the identity card answered is compared;
Step S3, when the similarity of comparison result is greater than or equal to predetermined threshold value, into the unlock success of the application program Operation interface afterwards.
2. unlocking method as described in claim 1, which is characterized in that also have following steps between step S1 and step S2:
Whether the unique mark for step S101, judging to trigger the user of unlocking signal has been associated with corresponding human face photo, if so, Step S2 is performed, otherwise, performs step S102;
Step S102, the identity card picture of the user is obtained, human face photo is extracted from the identity card picture, and by described in The unique mark of user is associated preservation, return to step S1 with human face photo.
3. unlocking method as claimed in claim 2, which is characterized in that the human face photo is stored in Cloud Server.
4. unlocking method as described in claim 1, which is characterized in that the predetermined threshold value is 75%.
5. unlocking method as described in claim 1, which is characterized in that the step S3 is further included:
When the similarity of comparison result is less than predetermined threshold value, display unlock failure information, and return to step S1.
6. a kind of tripper of application program, which is characterized in that including with lower module:
Receiving module for receiving the unlocking signal triggered by user, and obtains the unique mark of the user;
Comparing module, for passing through the facial image that camera obtains the user, and by the facial image with it is described unique The human face photo for identifying corresponding identity card is compared;
Unlocked state, for when the similarity of comparison result be greater than or equal to predetermined threshold value when, into the solution of the application program Operation interface after locking successfully.
7. tripper as claimed in claim 6, which is characterized in that also have following walk between receiving module and comparing module Suddenly:
Whether judgment module, the unique mark for judging to trigger the user of unlocking signal have been associated with corresponding human face photo, if It is then to perform comparing module, otherwise, performs binding module;
Binding module for obtaining the identity card picture of the user, extracts human face photo, and will from the identity card picture The unique mark of the user is associated preservation with human face photo, returns to receiving module.
8. tripper as claimed in claim 6, which is characterized in that the predetermined threshold value is 75%.
9. tripper as claimed in claim 6, which is characterized in that the unlocked state further includes:When the phase of comparison result When being less than predetermined threshold value like degree, display unlock failure information, and return to receiving module.
10. a kind of mobile terminal, which is characterized in that including memory and processor;
The memory, for storing program instruction;
The processor, for running described program instruction, to perform the application journey as described in claim 1 to 5 any one The step of unlocking method of sequence.
CN201710483395.9A 2017-06-22 2017-06-22 A kind of unlocking method of application program, device and mobile terminal Pending CN108133129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710483395.9A CN108133129A (en) 2017-06-22 2017-06-22 A kind of unlocking method of application program, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710483395.9A CN108133129A (en) 2017-06-22 2017-06-22 A kind of unlocking method of application program, device and mobile terminal

Publications (1)

Publication Number Publication Date
CN108133129A true CN108133129A (en) 2018-06-08

Family

ID=62388505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710483395.9A Pending CN108133129A (en) 2017-06-22 2017-06-22 A kind of unlocking method of application program, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN108133129A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359458A (en) * 2018-10-19 2019-02-19 北京小米移动软件有限公司 Using unlocking method, device and computer readable storage medium
CN110858863A (en) * 2018-08-24 2020-03-03 庄连豪 System for providing predefined functions using encrypted images and method for implementing same
CN114124400A (en) * 2021-11-02 2022-03-01 南京星邺汇捷网络科技有限公司 Method for realizing mobile phone token based on face recognition
CN116882761A (en) * 2023-08-23 2023-10-13 广州智算信息技术有限公司 Enterprise health degree assessment system based on big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509138A (en) * 2011-11-18 2012-06-20 山东神思电子技术股份有限公司 Authentication system based on second-generation ID card and human face feature recognition and working method therefor
CN103593598A (en) * 2013-11-25 2014-02-19 上海骏聿数码科技有限公司 User online authentication method and system based on living body detection and face recognition
CN104065823A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN104065817A (en) * 2014-06-16 2014-09-24 惠州Tcl移动通信有限公司 Mobile terminal identity authentication processing method and system based on iris identification
CN106650361A (en) * 2015-10-30 2017-05-10 中兴通讯股份有限公司 Unblocking method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509138A (en) * 2011-11-18 2012-06-20 山东神思电子技术股份有限公司 Authentication system based on second-generation ID card and human face feature recognition and working method therefor
CN103593598A (en) * 2013-11-25 2014-02-19 上海骏聿数码科技有限公司 User online authentication method and system based on living body detection and face recognition
CN104065817A (en) * 2014-06-16 2014-09-24 惠州Tcl移动通信有限公司 Mobile terminal identity authentication processing method and system based on iris identification
CN104065823A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN106650361A (en) * 2015-10-30 2017-05-10 中兴通讯股份有限公司 Unblocking method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110858863A (en) * 2018-08-24 2020-03-03 庄连豪 System for providing predefined functions using encrypted images and method for implementing same
CN109359458A (en) * 2018-10-19 2019-02-19 北京小米移动软件有限公司 Using unlocking method, device and computer readable storage medium
US11822632B2 (en) 2018-10-19 2023-11-21 Beijing Xiaomi Mobile Software Co., Ltd. Methods, mechanisms, and computer-readable storage media for unlocking applications on a mobile terminal with a sliding module
CN114124400A (en) * 2021-11-02 2022-03-01 南京星邺汇捷网络科技有限公司 Method for realizing mobile phone token based on face recognition
CN116882761A (en) * 2023-08-23 2023-10-13 广州智算信息技术有限公司 Enterprise health degree assessment system based on big data

Similar Documents

Publication Publication Date Title
US20160269411A1 (en) System and Method for Anonymous Biometric Access Control
JP6820062B2 (en) Identity authentication methods and devices, terminals and servers
CN106068512B (en) Method and apparatus for verifying user on the mobile device
US9122913B2 (en) Method for logging a user in to a mobile device
US20160180068A1 (en) Technologies for login pattern based multi-factor authentication
US20130223696A1 (en) System and method for providing secure access to an electronic device using facial biometric identification and screen gesture
US20110185402A1 (en) Access control system
CN108133129A (en) A kind of unlocking method of application program, device and mobile terminal
CN109389727A (en) Method for unlocking, system and computer readable storage medium
CN106101135A (en) A kind of account login system based on face and fingerprint recognition and its implementation
CN108806041A (en) Building access control method, Cloud Server and computer readable storage medium
CN107786487B (en) Information authentication processing method, system and related equipment
CN110414271A (en) A kind of private data guard method, device and computer readable storage medium
CN104156648A (en) Screen unlocking method and device
CN106650361A (en) Unblocking method and device
CN106469284A (en) A kind of information processing method, device and mobile terminal
CN105306202B (en) Auth method, device and server
CN106817342A (en) Active identity authorization system based on user behavior feature recognition
Mecke et al. Open sesame! user perception of physical, biometric, and behavioural authentication concepts to open doors
CN105407069A (en) Living body authentication method and device, client equipment, and server
EP3410330B1 (en) Improvements in biometric authentication
CN105530357A (en) Gesture identity authentication system and method based on sensor on mobile phone
CN205427857U (en) Identity identification system based on many biological characteristics combine equipment fingerprint
KR102060563B1 (en) Method and apparatus for providing authentication using voice and facial data
CN106452766B (en) Password retrieving method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180608

RJ01 Rejection of invention patent application after publication