WO2019041243A1 - 指纹传感器功能的验证方法及终端 - Google Patents

指纹传感器功能的验证方法及终端 Download PDF

Info

Publication number
WO2019041243A1
WO2019041243A1 PCT/CN2017/099966 CN2017099966W WO2019041243A1 WO 2019041243 A1 WO2019041243 A1 WO 2019041243A1 CN 2017099966 W CN2017099966 W CN 2017099966W WO 2019041243 A1 WO2019041243 A1 WO 2019041243A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint sensor
fingerprint
information
matching
threshold
Prior art date
Application number
PCT/CN2017/099966
Other languages
English (en)
French (fr)
Inventor
高伟强
崔闯
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/099966 priority Critical patent/WO2019041243A1/zh
Priority to CN201780064703.2A priority patent/CN109844764B/zh
Publication of WO2019041243A1 publication Critical patent/WO2019041243A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition

Definitions

  • the present invention relates to the field of fingerprint verification, and in particular, to a method and a terminal for verifying a function of a fingerprint sensor.
  • the user may cause dead pixels in the fingerprint due to static electricity, bumps, drops, etc., when the user enters a new fingerprint template or unlocks the terminal to update the template, the bad area
  • the image will be entered or updated to the verification template. Since the image of the dead zone is fixed, when the unlocked fingerprint is used, the image of the bad spot area is matched as the fingerprint feature point. When the feature point of the bad spot area is enough, it is bad. When the feature information represented by the point is sufficient, the feature information is used as a normal fingerprint feature for verification and identification, and an uninputted fingerprint may also unlock the terminal, which seriously affects the user's information security.
  • whether the fingerprint module is disabled is determined by whether the dead pixel on the fingerprint sensor exceeds the allowable range. For example, in the range of the dead point, the bad point area is shielded by updating the template or verifying the match. Verify the valid fingerprint area; if the dead point is outside the allowable range, directly disable the fingerprint module.
  • the above operation algorithm is complicated, and various functions of the fingerprint are not separately set in the module abnormality, and the function is not determined. After the fingerprint module has a problem, various uncontrollable problems are caused, and once the dead point occurs. The fingerprint module is directly disabled beyond the allowable range.
  • the function of the fingerprint module is not only applied to the field of identity recognition such as fingerprint unlocking and secure payment, but also can recognize single-click, long-press, slide and other operations, and can be more enriched with related programs.
  • Applications When a certain function of the fingerprint is affected, some functions can be used normally. If all the functions of the module are disabled, a certain amount of resources will be wasted.
  • the embodiment of the invention provides a method for verifying the function of a fingerprint sensor and a terminal.
  • the technical problem to be solved is that when the dead point on the fingerprint sensor exceeds the allowable range, an illegal unlocking operation may occur, and if the direct unlocking is adopted, The fingerprint module reduces the illegal unlocking operation, which causes all the functions of the fingerprint sensor to fail at the same time, resulting in waste of resources.
  • the present invention provides a method for verifying the function of a fingerprint sensor.
  • the method for verifying the function of the fingerprint sensor includes: the finger touches the fingerprint sensor, and the terminal collects fingerprint information of the finger, and the fingerprint information of the finger includes the fingerprint. If the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information of the collected finger and the stored fingerprint template, and the matching threshold is based on the dead point information of the fingerprint sensor and the fingerprint sensor.
  • the information determines that the bad point information includes the number of dead pixels and the dead point position, and the information of the fingerprint sensor includes the size and the pixel of the fingerprint sensor; and according to the matching degree and the matching threshold, the verification result is determined.
  • the fingerprint is matched and the matching degree is calculated.
  • the verification result is determined according to the matching degree and the matching threshold.
  • the set security threshold is used to reduce the illegal unlocking problem. The probability of being born.
  • the method further comprises: adjusting the matching threshold according to the number of dead pixels and the dead point position, the dead point information including the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the method further includes: determining a matching threshold according to the number of dead pixels and the dead point position; wherein the dead point information includes the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the step of determining the verification result specifically includes: if the matching degree is greater than or equal to the matching threshold, the identity verification function of the fingerprint sensor is successfully verified; if the matching degree is less than the matching threshold , the fingerprint sensor's identity class verification function verification failed.
  • the identity class verification function is verified by discriminating the matching degree and the matching threshold. When the matching degree does not satisfy the matching threshold, the identity class verification function fails to be verified.
  • the identity verification function of the fingerprint sensor if the matching threshold does not meet the preset security threshold, the identity verification function of the fingerprint sensor is disabled.
  • the fingerprint sensor function adopts different discriminating conditions.
  • the discriminating condition of the identity class verification function is that the matching threshold satisfies the preset safety threshold value, and the fingerprint sensor's dead point exceeds the allowable range, and the fingerprint sensor is directly disabled. Operation, reducing waste of resources.
  • the verification method of the fingerprint sensor function further includes: if the number of dead pixels in the area of the operation function of the fingerprint sensor exceeds a preset number, the operation function of the fingerprint sensor is disabled.
  • the operation class function is discriminated. If the number of dead pixels located in the operation function area of the fingerprint sensor exceeds the preset number, the operation class function is disabled, instead of disabling all functions of the fingerprint sensor, thereby reducing resource waste.
  • an embodiment of the present invention provides a terminal, where the terminal includes: an acquisition unit, a calculation unit, and a determination unit.
  • the collecting unit is configured to collect fingerprint information of the finger, and the fingerprint information of the finger includes dead point information of the fingerprint sensor; when the matching threshold meets a preset safety threshold, the calculating unit according to the finger
  • the fingerprint information and the stored fingerprint template are used to calculate a matching degree; wherein the matching threshold is determined according to the dead point information of the fingerprint sensor and the information of the fingerprint sensor, the information of the fingerprint sensor includes the size and the pixel of the fingerprint sensor; and the determining unit is configured to The matching degree and the matching threshold determine the verification result.
  • the computing unit when the matching threshold meets the security threshold, the computing unit performs a matching operation on the fingerprint, and calculates a matching degree.
  • the determining unit determines the verification result according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • the method further comprises: adjusting the matching threshold according to the number of dead pixels and the dead point position, the dead point information including the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the determining unit is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity verification function of the fingerprint sensor is successfully verified; if the matching degree is less than the matching threshold, the fingerprint sensor is The verification of the class verification function failed.
  • the identity class verification function is verified by discriminating the matching degree and the matching threshold. When the matching degree does not satisfy the matching threshold, the identity class verification function verification fails.
  • the determining unit is further configured to disable the identity class verification function of the fingerprint sensor if the matching threshold does not satisfy the preset security threshold.
  • the fingerprint sensor function adopts different discriminating conditions.
  • the discriminating condition of the identity class verification function is that the matching threshold satisfies the preset safety threshold value, and the fingerprint sensor's dead point exceeds the allowable range, and the fingerprint sensor is directly disabled. Operation, thereby reducing resource waste.
  • the determining unit is further configured to disable the operation function of the fingerprint sensor if the number of dead pixels in the area of the operation function of the fingerprint sensor exceeds a preset number.
  • the operation class function is discriminated. If the number of dead pixels located in the operation function area of the fingerprint sensor exceeds the preset number, the operation class function is disabled, instead of disabling all functions of the fingerprint sensor, thereby reducing resource waste.
  • an embodiment of the present invention provides a terminal, where the terminal includes: a processor and a memory. a memory for storing program instructions; a processor, configured to perform the following steps according to the program instructions stored in the memory; if the terminal detects that the finger of the user touches the fingerprint sensor, collecting fingerprint information of the finger, where the fingerprint information includes a bad sensor Point information, and when the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information of the finger and the stored fingerprint template, and then the verification result is judged according to the matching degree and the matching threshold; wherein the matching threshold is based on the fingerprint sensor The dead point information and the information of the fingerprint sensor determine that the information of the fingerprint sensor includes the size and pixel of the fingerprint sensor.
  • the processor when the matching threshold meets the security threshold, the processor performs a matching operation on the fingerprint to calculate a matching degree.
  • the verification result is determined according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • the method further comprises: adjusting the matching threshold according to the number of dead pixels and the dead point position, the dead point information including the number of dead points and the dead point position.
  • the matching threshold needs to be appropriately adjusted according to the bad point information on the fingerprint sensor, thereby reducing the probability of the illegal unlocking problem occurring.
  • the processor is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity verification function of the fingerprint sensor is successfully verified; if the matching degree is less than the matching threshold, the identity verification function of the fingerprint sensor is verified. failure.
  • the identity class verification function is verified by discriminating the matching degree and the matching threshold. When the matching degree does not satisfy the matching threshold, the identity class verification function fails to be verified.
  • the processor is further configured to disable the identity class verification function of the fingerprint sensor if the matching threshold does not satisfy the preset security threshold.
  • the fingerprint sensor function adopts different discriminating conditions.
  • the discriminating condition of the identity class verification function is that the matching threshold satisfies the preset safety threshold value, and the fingerprint sensor's dead point exceeds the allowable range, and the fingerprint sensor is directly disabled. Operation, reducing waste of resources.
  • the processor is further configured to disable the operation function of the fingerprint sensor if the number of dead pixels in the area of the operation function of the fingerprint sensor exceeds a preset number.
  • the operation class function is discriminated. If the number of dead pixels located in the operation function area of the fingerprint sensor exceeds the preset number, the operation class function is disabled, instead of disabling all functions of the fingerprint sensor, thereby reducing resource waste.
  • Embodiments of the present invention provide a computer program product comprising instructions for performing a verification method or step of the fingerprint sensor function when the instruction is run on a computer.
  • Embodiments of the present invention provide a computer readable storage medium for storing instructions when the instructions are in the The verification method or step of the above fingerprint sensor function is executed when executed on a computer.
  • the method and the terminal for verifying the function of the fingerprint sensor provided by the embodiment of the present invention, by setting the matching threshold and the security threshold, perform the fingerprint matching operation when the matching threshold meets the security threshold, and calculate the matching degree.
  • the probability of occurrence of the illegal unlocking problem is reduced, and when the fingerprint sensor is abnormal, the functions of the fingerprint sensor are respectively determined, which can effectively improve the utilization of the fingerprint sensor and reduce resource consumption.
  • FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a method for verifying a fingerprint sensor function according to an embodiment of the present invention
  • 3 is a common type of fingerprint detail features in a fingerprint sensor function verification method according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of a method for dynamically adjusting a matching threshold according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • the terminal includes, but is not limited to, a mobile phone, a smart door lock, a smart wearable, and the like.
  • FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the terminal 100 includes: a radio frequency (RF) circuit 110, a memory 120, an input unit 130, a display unit 140, an audio circuit 150, a processor 160, and a wireless local area network (WLAN).
  • RF radio frequency
  • Module 170, power supply 180, and Bluetooth module 190 and the like It will be understood by those skilled in the art that the terminal structure shown in FIG. 1 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
  • the RF circuit 110 can be used to send and receive information, for example, to connect to a mobile broadband.
  • RF circuit 110 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • the RF circuit 110 can also forward the mobile bandwidth service to the WLAN module 170 to forward the mobile bandwidth service to other terminals through the WLAN module 170.
  • wireless communication can adopt any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), and code division multiple access (Code).
  • CDMA Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • E-mail Short Messaging Service
  • the memory 120 can be used to store program instructions, and the processor 160 causes the terminal to perform the methods as shown in Figures 2 and 4 by running program instructions stored in the memory 120.
  • the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system and an application required to implement a verification method of the fingerprint sensor function, and the like.
  • the storage data area can store list information of the terminal and data generated by the terminal when performing the verification method of the fingerprint sensor function.
  • the memory 120 may include a volatile memory such as a random-access memory (RAM); the memory 120 may also include a non-volatile memory, such as only Read-only memory (ROM), flash memory, hard disk drive (HDD) or solid-state drive (SSD).
  • the memory 120 may also include a combination of the above types of memory.
  • the input unit 130 can be configured to receive digital or character information input by the user, including turning on a WLAN hotspot command, selecting an instruction of a terminal sharing the WLAN hotspot, and the like.
  • the input unit 130 may include a touch panel 131 and other input devices 132.
  • the touch panel 131 also referred to as a touch screen, can collect touch operations on or near the user (such as a user using a finger, a stylus, or the like on the touch panel 131 or near the touch panel 131. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 631 can include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 160 is provided and can receive commands from the processor 160 and execute them.
  • the input unit 130 can implement the touch panel 131 by using various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 130 may also include other input devices 132.
  • other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 140 can be used to display information input by the user or information provided to the user as well as various menus of the terminal.
  • the display unit 140 may include a display screen 141.
  • the display screen 141 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 131 can cover the display screen 141. When the touch panel 131 detects a touch operation on or near the touch panel 131, the touch panel 131 transmits to the processor 160 to determine the type of the touch event, and then the processor 160 according to the touch event. The type provides a corresponding visual output on display 141.
  • the touch panel 131 and the display screen 141 function as two separate components to implement input and input functions of the terminal, in some embodiments, the touch panel 131 may be integrated with the display screen 141. Realize the input and output functions of the terminal.
  • the audio circuit 150, the speaker 151, and the microphone 152 can provide an audio interface between the user and the terminal 100.
  • the audio circuit 150 can transmit the converted electrical data of the received audio data to the speaker 151 for conversion to the sound signal output by the speaker 151; on the other hand, the microphone 152 converts the collected sound signal into an electrical signal by the audio circuit 150. After receiving, it is converted into audio data, and then processed by the audio data output processor 160, transmitted to the terminal, for example, via the RF circuit 110, or outputted to the memory 120 for further processing.
  • the processor 160 is the control center of the terminal, which connects various parts of the entire terminal using various interfaces and lines, and executes by executing or executing software programs and/or modules stored in the memory 120, and calling data stored in the memory 120.
  • processor 160 may include one or more processing units.
  • the processor 160 can integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, etc., and the modem processor mainly processes wireless communication. It will be appreciated that the above described modem processor may also not be integrated into the processor 160.
  • the WLAN module 170 can be used to assist users in sending and receiving emails, browsing web pages, and accessing streaming media, etc., which provides users with wireless broadband WLAN Internet access.
  • the WLAN is a short-range wireless transmission technology, and the terminal can access the WLAN hotspot through the WLAN module 170, and the WLAN hotspot can be turned on by the WLAN module 170 to forward the mobile bandwidth service to other terminals.
  • the WLAN module 170 can also perform Wi-Fi broadcast and scanning to enable wireless communication with other nearby terminals.
  • the terminal also includes a power source 180 (such as a battery) that supplies power to the various components.
  • a power source can be logically coupled to the processor 160 through the power management system to manage functions such as charging, discharging, and power consumption through the power management system.
  • the Bluetooth module 190 can be a Bluetooth Low Energy (BLE) device, a traditional Bluetooth device, or a dual-mode Bluetooth device supporting traditional Bluetooth and BLE.
  • BLE Bluetooth Low Energy
  • the Bluetooth module 190 establishes a BLE or classic Bluetooth connection with the Bluetooth modules of other terminals, and the Bluetooth module 190 can also perform BR or BLE broadcast and scanning to achieve wireless communication with other surrounding terminals.
  • the terminal may further include a camera, a speaker, etc., and details are not described herein again.
  • the terminal includes a processor 160 and a memory 120 for storing program instructions.
  • the processor 160 is configured to perform the following operations according to the program instructions stored in the memory 120: if the terminal detects the user's When the finger touches the fingerprint sensor, the fingerprint information of the finger is collected, and the fingerprint information includes the bad point information of the fingerprint sensor.
  • the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information and the stored fingerprint template. Based on the matching degree and the matching threshold, the verification result is determined.
  • the matching threshold is determined according to the dead point information of the fingerprint sensor and the information of the fingerprint sensor, and the information of the fingerprint sensor includes the size and the pixel of the fingerprint sensor.
  • the processor 160 is further configured to: adjust a matching threshold according to the dead point information, where the dead point information includes a number of dead points and a dead point position.
  • the processor 160 is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity class verification function is successfully verified; if the matching degree is less than the matching threshold, the identity class verification function fails to be verified. .
  • the processor 160 is further configured to disable the identity class verification function if the matching threshold does not meet the preset security threshold.
  • the processor 160 is further configured to disable the operation class function if the area of the operation function of the fingerprint sensor is damaged.
  • the processor when the matching threshold meets the security threshold, the processor performs a matching operation on the fingerprint and calculates a matching degree. The processor then determines the verification result based on the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • FIG. 2 is a flowchart of a method for verifying a fingerprint sensor according to an embodiment of the present invention. As shown in FIG. 2, the method for verifying the fingerprint sensor includes:
  • Step S201 If it is detected that the finger touches the fingerprint sensor, the fingerprint sensor collects the fingerprint information of the finger, wherein the fingerprint information of the finger includes the bad point information of the fingerprint sensor.
  • the fingerprint sensor When the user enters the fingerprint on the terminal for the first time, the fingerprint sensor will fingerprint the user's finger placed on the surface of the fingerprint sensor, and usually enters it several times until the terminal reminds the entry. Before entering the fingerprint, you need to enter the setting fingerprint interface of the terminal. The user needs to create a digital password or a mixed password. When the fingerprint sensor fails to verify the fingerprint, the user can use the set password to unlock.
  • the fingerprint sensor and the HOME button can be combined into one function button on the terminal, or they can be set separately.
  • the fingerprint sensor and the HOME key are combined into one function key, which can be disposed directly under the terminal display unit 140, and the appearance presented on the terminal can be a circle or a rectangle with four corners being curved.
  • the HOME button is generally disposed directly below the display screen 141, and can be a physical button.
  • the fingerprint sensor can be disposed on the front, back, and side of the terminal, and the front of the terminal is provided with a display. On this side of the screen 141, the fingerprint sensor can be a physical function button, and the physical fingerprint sensor can be combined with the power button to form a function button, or can be set on the back of the terminal. If the fingerprint sensor is not a physical function button, it can be set on the display screen. 141.
  • the fingerprint information of the fingerprint sensor is mainly used to extract the feature of the fingerprint image.
  • Feature extraction is the core algorithm in the process of fingerprint identification and identification.
  • the task of feature extraction algorithm is to detect the number of feature points in the fingerprint image and the type of each feature point, the location of the feature points and the direction of the line in the region where the feature points are located.
  • Feature point types include singular points and minutiae points.
  • the accuracy and accuracy of the extraction of singular points and minutiae points determine the performance of the fingerprint recognition system, that is, the recognition rate.
  • the point of detail refers to the mutation of the fingerprint ridge.
  • the common ones are mainly the types shown in Figure 3.
  • Statistical experiments show that the endpoint and the bifurcation point are the most common details in the fingerprint.
  • the fingerprint information of the finger is collected, including determining the position of the endpoint and the bifurcation point, and then determining whether the fingerprint matches by comparing the mutual relationship between the feature points.
  • the fingerprint of the finger is mainly taken as an example for description.
  • any information that can be used to extract similar fingerprint feature information is information that can effectively represent the user's identity, and can be replaced, and will not be described here.
  • the fingerprint information of the collected finger may be implemented by any other method in the prior art, and details are not described herein.
  • the dead point information of the fingerprint sensor can be collected by downloading two fingerprint sensor images of different configurations, wherein the configuration described herein is a parameter configuration of the signal conditioning circuit in the fingerprint sensor, and signal conditioning
  • the parameters of the circuit include offset and gain.
  • the configuration of the signal conditioning circuit is different.
  • the gray level of each point of the acquired image of the fingerprint sensor is also different; if all the points of the same position in the two fingerprint sensor images are compared, if compared If the gradation difference of the point is abnormal, the point is considered to be a dead point.
  • the number of the dead pixels in the fingerprint sensor is not limited thereto, and may be implemented in other manners in the prior art, and details are not described herein.
  • the method for verifying the fingerprint sensor provided by the embodiment of the present invention is to perform corresponding operations on the terminal through the fingerprint after the terminal has entered the fingerprint.
  • Step S202 If the matching threshold meets the preset security threshold, the matching degree is calculated according to the fingerprint information of the finger and the stored fingerprint template; wherein the matching threshold is determined according to the dead point information of the fingerprint sensor and the information of the fingerprint sensor.
  • the matching threshold may be dynamically adjusted according to the dead point information, wherein the dead point information includes a number of dead points and a dead point position, and the fingerprint sensor information includes: a size, a resolution, and at least a pixel of the sensor.
  • the matching threshold may be appropriately increased according to the bad point information of the fingerprint sensor, that is, the matching success difficulty is increased.
  • the matching threshold is 50%.
  • the user can unlock the terminal with the fingerprint of the already entered finger, and it is easy to achieve 50% matching, and the unlocking succeeds; but the fingerprint is not unlocked with the fingerprint that is not entered. It is difficult to achieve a 50% match and the unlock fails.
  • the probability of illegal unlocking is increased regardless of whether the finger fingerprint or the unfinished finger fingerprint is used to unlock the terminal.
  • the bad point information is not the texture feature of the fingerprint itself, but the bad point information is included in the correct fingerprint information, and has a great influence on the matching result in the fingerprint matching process. If the unfinished finger print is used to unlock the terminal, the degree of matching may easily exceed 50%, and there is a risk of illegal unlocking. Therefore, when there is a dead pixel in the fingerprint sensor, the matching threshold may be appropriately increased to reduce the risk of illegal unlocking. For example, when a bad point appears on the fingerprint sensor, the matching threshold of 50% needs to be adjusted according to the bad point information of the collected fingerprint sensor.
  • the adjusted matching threshold can be, for example, 60%. Re-adjusted matching threshold and number of dead pixels, dead pixels on the fingerprint sensor Related to, when the number of dead pixels is fixed, the matching threshold is determined by the position of the dead point on the fingerprint sensor. If the endpoint, the intersection, etc. at the dead point are image processed to form the feature information of the fingerprint image, the matching threshold will be 50. % is adjusted based on more.
  • an adjustment period may be set to adjust the matching threshold according to the collected fingerprint information.
  • the matching threshold may be adjusted at the end of an adjustment period, and the bad point information of the fingerprint sensor is collected in an adjustment period. At the end of the one adjustment period, according to the badness of the fingerprint sensor that has been collected in the one adjustment period.
  • the point information adjusts the original matching threshold, and the original matching threshold can be considered to be fixed during the one adjustment period.
  • a security threshold is set for the matching threshold, and the fingerprint verification can be started only if the matching threshold meets the requirement of the preset security threshold.
  • the security threshold is used to indicate that the matching threshold is below the security threshold, and the fingerprint sensor usually does not illegally unlock.
  • the template calculates the matching degree to calculate the matching degree; the matching threshold value can be obtained by adjusting the original matching threshold value in the adjustment period according to the dead point information of the fingerprint sensor collected in the previous adjustment period.
  • the matching threshold satisfies the security threshold value, which means that the endpoints, intersections, and the like at the dead point of the fingerprint sensor do not form a fingerprint image after image processing, and the number of dead pixels on the fingerprint sensor does not exceed the allowable range. If the current matching threshold exceeds the security threshold, it is considered that the illegal unlocking of the fingerprint is uncontrollable. In this case, the unlocking function of the fingerprint can be directly disabled. When the fingerprint unlock function is disabled, you can unlock it by entering a character password.
  • the matching threshold does not meet the security threshold and includes the following cases:
  • the number of dead pixels on the fingerprint sensor exceeds the preset number; because the number of dead pixels exceeds the preset number, the matching threshold adjusted according to the number of dead pixels can no longer meet the security threshold, and the security threshold can be preset. The number of bad points in the number is determined.
  • the second case the endpoints, intersections, etc. of the dead pixels on the fingerprint sensor form image information of the fingerprint image after image processing, and the feature information is superimposed on the normal fingerprint image to form new feature information, and the matching is adjusted according to the feature information. Threshold, the adjusted matching threshold does not meet the security threshold.
  • the adjustment period can be dynamically changed. For example, in the initial stage of the use of the fingerprint sensor, the fingerprint sensor is newer at this time, and the possibility of occurrence of a dead pixel is slightly smaller, and the adjustment period can be set to be extremely long; in the later stage of use of the fingerprint sensor, as the use time of the fingerprint sensor is extended, The possibility of a dead pixel appearing on the fingerprint sensor increases, and at this time, the adjustment period can be shortened.
  • the mechanism for triggering the detection of the bad point information of the fingerprint sensor includes operations not limited to timing, power on/off, fingerprint unlocking, fingerprint touch, etc., and the ambient light sensor, the proximity light sensor, the acceleration sensor, and the like, Various sensors such as gyroscopes and Hall devices are comprehensively judged to find the best dead point detection opportunity and obtain more accurate fingerprint dead point information, so as to make a more accurate judgment on the fingerprint state.
  • Step S203 Determine the verification result according to the matching degree and the matching threshold.
  • the verification is successful if the matching degree is greater than or equal to the matching threshold.
  • the verification fails.
  • the function of the fingerprint sensor may include an identity class verification function and an operation class function
  • the identity class verification function may include, for example, a fingerprint unlocking, a fingerprint payment, and the like, which need to match the fingerprint
  • the operation function for example, may Including long press, single double click, slide, take photos, answer calls, etc. does not require fingerprint matching.
  • the terminal instructs the user to re-press the fingerprint sensor, and then performs steps S201-S203 again. If the verification fails repeatedly, the terminal locks, and the user presses the fingerprint sensor at this time, and the terminal does not execute. Steps S201-S203, but remind the user to input a preset number or character password for unlocking.
  • the division of the function of the fingerprint sensor may not be classified according to the above classification, and may be classified according to similar operations, and will not be described herein.
  • step S201 to step S203 are verifications of the identity class verification function.
  • step S203 if the matching degree is greater than or equal to the matching threshold, the identity class verification function is successfully verified; if the matching degree is less than the matching threshold, the identity class verification function is verified. failure.
  • the operation class function can also be verified. Operation class verification identifies the user's operation through a specific area or module set on the fingerprint sensor. If the specific area or module can recognize the user's operation, the operation class function is normal; if the user's operation cannot be effectively recognized, Disable the operation class function.
  • Operational function verification includes the following methods:
  • a specific area is set on the fingerprint sensor, and only the area where the fingerprint sensor is divided is determined, and the specific area is an operation for recognizing the sliding, clicking, and the like of the finger fingerprint, and when the damage occurs in the specific area, the influence is affected. Operational functions such as sliding click of a fingerprint. If the area outside the specific area is damaged, it will not affect the operation function of the fingerprint.
  • the second way using the image acquisition module, assumes that the user performs a sliding operation, and can continuously collect multiple frames of images through the image acquisition module, and compare the acquired multi-frame images, thereby determining the direction of the sliding operation by the time and position of the image.
  • the algorithm can determine that the operation class function is abnormal, so the operation function can be verified by the image acquisition module.
  • the third way is to integrate a capacitor plate in the sensor module area of the fingerprint module, and the capacitor plate is used for recognizing the pressing of the finger.
  • the operation such as pressing can be identified according to the signal change of the capacitor plate, and the operation function can be verified by whether the signal of the capacitor plate is abnormal.
  • the operation function can be verified. If the operation function verification fails, the area for identifying the sliding, clicking, and the like of the finger fingerprint is damaged. At this time, the identity verification function is retained. The operation class function is disabled; if the operation function verification is successful, that is, the area for recognizing the sliding, clicking, etc. of the finger fingerprint is intact, the identity class verification function and the operation class function are normal.
  • the operation class function can be verified. If the operation class function verification fails, that is, the area for identifying the sliding, clicking, etc. of the finger fingerprint is damaged, the identity class verification function and the operation class function are disabled. If the operation function verification is successful, that is, the area for recognizing the sliding, clicking, etc. of the finger fingerprint is intact, the disabling identity class verification function retains the operation class function.
  • the verification of the identity class verification function and the operation class function is performed before and after, and can be performed simultaneously. It is also possible to perform verification of the operation class function and then verify the identity class verification function.
  • the embodiment of the invention provides a method for verifying the function of the fingerprint sensor.
  • the matching threshold meets the security threshold, the matching operation is performed on the fingerprint, and the matching degree is calculated.
  • the verification result is determined according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • FIG. 4 is a flowchart of a method for dynamically adjusting a matching threshold according to an embodiment of the present invention. As shown in FIG. 4, the method for dynamically adjusting the matching threshold may include the following steps:
  • Step 401 Collect finger information of the finger and detect the number of bad points and the position of the dead point of the fingerprint sensor.
  • step S401 when the user touches the finger with the fingerprint sensor, the fingerprint information of the fingerprint is collected.
  • the fingerprint information includes the bad point information of the fingerprint sensor, and the bad point information of the fingerprint sensor may be stored first to be used for reference when adjusting the matching threshold.
  • the fingerprint information of the finger is collected, and the feature information of the fingerprint image of the finger is extracted.
  • the feature information of the fingerprint image of the finger is extracted.
  • Step S402 If the dead point information of the fingerprint sensor is detected, the matching threshold is recalculated according to the dead point information of the fingerprint sensor.
  • Step S403 Determine whether the matching threshold meets the security threshold.
  • step S404 is performed to perform matching verification on the collected fingerprint information and the stored fingerprint template to calculate a matching degree.
  • step 411 is performed.
  • Step S405 It is determined whether the matching degree is greater than or equal to the matching threshold. When the matching degree is less than the matching threshold, step S406 is performed; when the matching degree is greater than or equal to the matching threshold, step S407 is performed.
  • Step S406 The verification fails.
  • Step S407 The verification is successful.
  • Step S408 Determine whether the operation class function is affected. If it does not affect, step S410 is performed; if it is affected, step S409 is performed.
  • Step S409 Disable the operation class function and retain other functions that are not affected.
  • Step S410 The identity class verification function and the operation class function are normal.
  • Step S411 Disable fingerprint identity class function verification.
  • Step S412 Determine whether the operation class function is affected. If it does not affect, step S413 is performed; if it is affected, step S414 is performed.
  • Step S413 Disable the authentication function and retain other functions that are not affected.
  • Step S414 The fingerprint is invalid.
  • Step S408 Disable the identity class verification function.
  • the matching threshold is updated according to the number of dead pixels and the dead point position of the fingerprint sensor, thereby reducing the probability of occurrence of the illegal unlocking problem.
  • FIG. 5 is a schematic structural diagram of another terminal according to an embodiment of the present invention. As shown in FIG. 5, the terminal may include: an acquisition unit 501, a calculation unit 502, and a determination unit 503.
  • the collecting unit 501 is configured to collect finger information of the user's finger by placing a finger on the fingerprint sensor, and the fingerprint information includes dead point information of the fingerprint sensor.
  • the collecting unit 501 is configured to collect fingerprint information of the user's finger, where the fingerprint information includes a bad letter of the fingerprint sensor.
  • the information is the same as described in the above step S201, and therefore will not be described again.
  • the calculating unit 502 is configured to: if the matching threshold meets the preset security threshold, calculate a matching degree according to the fingerprint information of the finger and the stored fingerprint template; wherein the matching threshold is based on the dead point information of the fingerprint sensor and the information of the fingerprint sensor It is determined that the information of the fingerprint sensor includes the size and pixel of the fingerprint sensor.
  • the calculating unit 502 is further configured to: adjust a matching threshold according to the dead point information, where the dead point information includes a number of dead points and a dead point position.
  • the calculation unit 502 is configured to adjust the matching threshold at the end of the adjustment period, which is the same as described in the above step S202, and therefore will not be described again.
  • the determining unit 503 is configured to determine a verification result according to the matching degree and the matching threshold.
  • the verification succeeds if the matching degree is greater than or equal to the matching threshold, that is, the matching degree is greater than or equal to the matching threshold.
  • the verification fails.
  • the function of the fingerprint sensor may include an identity class verification function and an operation class function
  • the identity class verification function may include, for example, a fingerprint unlocking, a fingerprint payment, and the like, which need to match the fingerprint
  • the operation function for example, may Including long press, single double click, slide, take photos, answer calls, etc. does not require fingerprint matching.
  • the division of the function of the fingerprint sensor may not be classified according to the above classification, and may be classified according to similar operations, and will not be described herein.
  • the determining unit 503 is specifically configured to: if the matching degree is greater than or equal to the matching threshold, the identity class verification function fails to be verified, and the identity class verification function needs to be disabled; if the matching degree is less than the matching threshold, the identity class verification function fails.
  • the determining unit 503 can also be used to verify the operation class function.
  • the operation function does not need to perform fingerprint matching. It only needs to determine the area where the fingerprint sensor is divided. This area is used to recognize the sliding, clicking, etc. of the finger fingerprint. When the damage occurs in the area, it will affect the sliding click of the fingerprint. Class function. If the area outside the area is damaged, it will not affect the operation function of the fingerprint.
  • the determining unit 503 is configured to verify the identity class function and the operation class function, and the process and manner of the verification are the same as those described in step S203, and thus are not described herein.
  • the computing unit when the matching threshold meets the security threshold, the computing unit performs a matching operation on the fingerprint, and calculates a matching degree.
  • the determining unit determines the verification result according to the matching degree and the matching threshold. Furthermore, by setting a discrimination condition added by the fingerprint sensor, the set security threshold reduces the probability of occurrence of the illegal unlocking problem.
  • Embodiments of the present invention provide a computer program product comprising instructions that, when executed on a computer, perform the methods or steps of Figures 2 and 4 above.
  • Embodiments of the present invention provide a computer readable storage medium for storing instructions that, when executed on a computer, perform the methods or steps of FIGS. 2 and 4 above.
  • a software functional unit If implemented in the form of a software functional unit and sold or used as a standalone product, it can be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application, in essence or the contribution to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium. Including a number of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform the present application. All or part of the steps of the method described in the examples.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

本发明实施例公开了一种指纹传感器功能的验证方法及终端。所述指纹传感器功能的验证方法包括如果检测到手指接触指纹传感器,就采集手指的指纹信息,该手指的指纹信息包括指纹传感器的坏点信息;若匹配阈值满足预设的安全门限值,则根据手指的指纹信息和已存储的指纹模板,计算匹配度;根据匹配度和匹配阈值确定验证结果;其中,匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,指纹传感器的信息包括指纹传感器的尺寸和像素。在本发明实施例中,实现了对指纹传感器功能设置条件,分别进行判定,解决了指纹传感器坏点超过一定范围时,全部禁用指纹传感器功能的问题。

Description

指纹传感器功能的验证方法及终端 技术领域
本发明涉及指纹验证领域,尤其涉及一种指纹传感器功能的验证方法及终端。
背景技术
用户在使用终端过程中,由于静电、磕碰、跌落等因素可能会导致指纹传感器(fingerprint)出现坏点(dead pixel),此时用户再录入新指纹模板或者解锁终端更新模板时,坏点区域的图像会被录入或更新至验证模板。由于坏点区域的图像是固定不变的,所以当使用未录入的指纹解锁时,坏点区域的图像会被当作指纹特征点做匹配,当坏点区域的特征点足够多时,即由坏点代表的特征信息足够多时,该特征信息会被当作正常的指纹特征用于验证识别,就会出现未录入的指纹也可以解锁该终端的现象,严重影响用户的信息安全。
现有技术中,通过指纹传感器上坏点是否超过允许范围来决定是否禁用指纹模组,例如,在坏点允许范围内,通过在更新模板或验证匹配的过程中对坏点区域进行屏蔽,只对有效指纹区域进行验证;若坏点超出允许范围,直接禁用指纹模组。上述操作算法复杂,且没有对指纹的各类功能在模组异常时分别设置使能条件,不对各功能进行判定,指纹模组出现问题后,会导致各种不可控的问题,并且一旦坏点超出允许范围,直接禁用指纹模组。随着应用的深入和技术的发展,指纹模组的功能不仅仅应用于指纹解锁、安全支付等身份识别类领域,还可以识别单双击、长按、滑动等操作,配合相关程序可以实现更加丰富的应用。当指纹的某一功能受到影响时,有些功能还可以正常使用,此时如果禁用模组所有功能会造成一定的资源浪费。
发明内容
本发明实施例提供了一种指纹传感器功能的验证方法及终端,其要解决的技术问题是,当指纹传感器上的坏点的超过允许的范围时,会出现非法解锁的操作,若采用直接禁用指纹模组来降低非法解锁操作,则会导致指纹传感器所有的功能同时失效,产生资源浪费。
第一方面,本发明提供了一种指纹传感器功能的验证方法,该指纹传感器功能的验证的方法包括:手指接触到指纹传感器,终端就会采集该手指的指纹信息,该手指的指纹信息包括指纹传感器的坏点信息,如果匹配阈值满足预设的安全门限值时,根据采集的手指的指纹信息和已存储的指纹模板,计算匹配度,该匹配阈值是根据指纹传感器的坏点信息和指纹传感器的信息确定,坏点信息包括坏点数量和坏点位置,指纹传感器的信息包括指纹传感器的尺寸和像素;再根据匹配度和匹配阈值,则确定验证结果。
本发明实施例提供的指纹传感器功能的验证方法,在匹配阈值满足安全门限值时,才对指纹进行匹配操作,并计算匹配度。再根据匹配度和匹配阈值,确定验证结果。进而通过指纹传感器增加的一个判别条件,设置的安全门限值,降低非法解锁问题发 生的概率。
在一个可能的实施例中,若检测指纹传感器出现坏点信息,方法还包括:根据坏点数量和坏点位置,调整匹配阈值,该坏点信息包括坏点数量和坏点位置。指纹传感器的坏点在增多的情况下,需要根据指纹传感器上的坏点信息适当调整匹配阈值,进而降低非法解锁问题发生的概率。
在一个可能的实施例中,若检测指纹传感器出现坏点信息,方法还包括:根据坏点数量和坏点位置,确定匹配阈值;其中,坏点信息包括坏点数量和坏点位置。指纹传感器的坏点在增多的情况下,需要根据指纹传感器上的坏点信息适当调整匹配阈值,进而降低非法解锁问题发生的概率。
在一个可能的实施例中,根据匹配度和匹配阈值,则确定验证结果的步骤具体包括:若匹配度大于或等于匹配阈值,则指纹传感器的身份类验证功能验证成功;若匹配度小于匹配阈值,则指纹传感器的身份类验证功能验证失败。通过判别匹配度和匹配阈值来验证身份类验证功能,在匹配度不满足匹配阈值时,身份类验证功能验证失败。
在一个可能的实施例中,若匹配阈值不满足预设的安全门限值,则禁用指纹传感器的身份类验证功能。将指纹传感器功能采用不同的判别条件,身份类验证功能的判别条件是,匹配阈值满足预设的安全门限值,也就不会出现指纹传感器的坏点超过允许的范围时,直接禁用指纹传感器的操作,减少资源浪费。
在一个可能的实施例中,指纹传感器功能的验证方法还包括:若位于所述指纹传感器的操作类功能的区域的坏点数量是否超过预设数量,则禁用指纹传感器的操作类功能。此处是对操作类功能进行判别,如果位于指纹传感器的操作类功能区域的坏点数量超过预设数量,则禁用操作类功能,而不是禁用指纹传感器全部的功能,减少资源浪费。
第二方面,本发明实施例提供了一种终端,该终端包括:采集单元、计算单元和确定单元。当用户的手指接触到指纹传感器时,采集单元,用于采集手指的指纹信息,该手指的指纹信息包括指纹传感器的坏点信息;在匹配阈值满足预设的安全门限值时,计算单元根据手指的指纹信息和已存储的指纹模板,计算匹配度;其中,匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,指纹传感器的信息包括指纹传感器的尺寸和像素;确定单元,用于根据匹配度和匹配阈值,则确定验证结果。
本发明实施例提供的终端,在匹配阈值满足安全门限值时,计算单元才对指纹进行匹配操作,计算匹配度。确定单元再根据匹配度和匹配阈值,确定验证结果。进而通过指纹传感器增加的一个判别条件,设置的安全门限值,降低非法解锁问题发生的概率。
在一个可能的实施例中,若检测指纹传感器出现坏点信息,方法还包括:根据坏点数量和坏点位置,调整匹配阈值,该坏点信息包括坏点数量和坏点位置。指纹传感器的坏点在增多的情况下,需要根据指纹传感器上的坏点信息适当调整匹配阈值,进而降低非法解锁问题发生的概率。
在一个可能的实施例中,确定单元具体用于:若匹配度大于或等于匹配阈值,则指纹传感器的身份类验证功能验证成功;若匹配度小于匹配阈值,则指纹传感器的身 份类验证功能验证失败。通过判别匹配度和匹配阈值来验证身份类验证功能,在匹配度不满足匹配阈值时,则身份类验证功能验证失败。
在一个可能的实施例中,确定单元还用于:若匹配阈值不满足预设的安全门限值,则禁用指纹传感器的身份类验证功能。将指纹传感器功能采用不同的判别条件,身份类验证功能的判别条件是,匹配阈值满足预设的安全门限值,也就不会出现指纹传感器的坏点超过允许的范围时,直接禁用指纹传感器的操作,进而减少资源浪费。
在一个可能的实施例中,确定单元还用于:若位于指纹传感器的操作类功能的区域的坏点数量超过预设数量,则禁用指纹传感器的操作类功能。此处是对操作类功能进行判别,如果位于指纹传感器的操作类功能区域的坏点数量超过预设数量,则禁用操作类功能,而不是禁用指纹传感器全部的功能,减少资源浪费。
第三方面,本发明实施例提供了一种终端,该终端包括:处理器和存储器。存储器,用于存储程序指令;处理器,用于根据存储器存储的程序指令执行以下步骤;如果终端检测到用户的手指接触到指纹传感器时,采集手指的指纹信息,该指纹信息包括纹传感器的坏点信息,并在匹配阈值满足预设的安全门限时,根据手指的指纹信息和已存储的指纹模板,计算匹配度,再根据匹配度和匹配阈值,判断验证结果;其中,匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,指纹传感器的信息包括指纹传感器的尺寸和像素。
本发明实施例提供的终端,在匹配阈值满足安全门限值时,处理器对指纹进行匹配操作,计算匹配度。再根据匹配度和匹配阈值,确定验证结果。进而通过指纹传感器增加的一个判别条件,设置的安全门限值,降低非法解锁问题发生的概率。
在一个可能的实施例中,若检测指纹传感器出现坏点信息,方法还包括:根据坏点数量和坏点位置,调整匹配阈值,该坏点信息包括坏点数量和坏点位置。指纹传感器的坏点在增多的情况下,需要根据指纹传感器上的坏点信息适当调整匹配阈值,进而降低非法解锁问题发生的概率。
在一个可能的实施例中,处理器具体用于:若匹配度大于或等于匹配阈值,则指纹传感器的身份类验证功能验证成功;若匹配度小于匹配阈值,则指纹传感器的身份类验证功能验证失败。通过判别匹配度和匹配阈值来验证身份类验证功能,在匹配度不满足匹配阈值时,身份类验证功能验证失败。
在一个可能的实施例中,处理器还用于:若匹配阈值不满足预设的安全门限值,则禁用指纹传感器的身份类验证功能。将指纹传感器功能采用不同的判别条件,身份类验证功能的判别条件是,匹配阈值满足预设的安全门限值,也就不会出现指纹传感器的坏点超过允许的范围时,直接禁用指纹传感器的操作,减少资源浪费。
在一个可能的实施例中,处理器还用于:若位于所述指纹传感器的操作类功能的区域的坏点数量超过预设数量,则禁用指纹传感器的操作类功能。此处是对操作类功能进行判别,如果位于指纹传感器的操作类功能区域的坏点数量超过预设数量,则禁用操作类功能,而不是禁用指纹传感器全部的功能,减少资源浪费。
本发明实施例提供了一种包含指令的计算机程序产品,当所述指令在计算机上运行时,执行上述指纹传感器功能的验证方法或步骤。
本发明实施例提供了一种计算机可读存储介质,用于存储指令,当所述指令在计 算机上执行时,执行上述指纹传感器功能的验证方法或步骤。
相比较现有技术,本发明实施例提供的一种指纹传感器功能的验证方法及终端,通过设置匹配阈值和安全门限值,在匹配阈值满足安全门限值时,才进行指纹匹配操作,计算匹配度,降低非法解锁问题发生的概率,同时在指纹传感器异常时,对指纹传感器的功能分别进行判别,能有效提高指纹传感器利用率,降低资源消耗。
附图说明
图1为本发明实施例提供的一种终端的结构示意图;
图2为本发明实施例提供了一种指纹传感器功能的验证方法的流程图;
图3为本发明实施例提供的指纹传感器功能的验证方法中指纹细节特征的常见类型;
图4为本发明实施例提供了一种动态调整匹配阈值方法的流程图;
图5为本发明实施例提供的另一种终端的结构示意图。
具体实施方式
在本发明实施例中,终端包括但不限于手机、智能门锁、智能穿戴等产品。图1为本发明实施例提供的一种终端的结构示意图。如图1所示,该终端100包括:射频(Radio Frequency,RF)电路110、存储器120、输入单元130、显示单元140、音频电路150、处理器160、无线局域网(Wireless Local Area Networks,WLAN)模块170、电源180以及蓝牙模块190等部件。本领域技术人员可以理解,图1示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
RF电路110可用于收发信息,例如,连接移动宽带。通常,RF电路110包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路110还可以将移动带宽业务转发至WLAN模块170,以通过WLAN模块170将移动带宽业务转发给其他终端。其中,无线通信可以采用任一通信标准或协议,包括但不限于全球移动通讯***(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器120可用于存储程序指令,处理器160通过运行存储在存储器120的程序指令,从而使得该终端执行如图2和图4所示的方法。存储器120可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作***以及实现指纹传感器功能的验证方法所需的应用程序等。存储数据区可存储终端的列表信息以及该终端在执行指纹传感器功能的验证方法时产生的数据等。此外,存储器120可包括易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM);所述存储器120也可以包括非易失性存储器(non-volatile memory),例如只读存储器(read-only memory,ROM),快闪存储器(flash memory),硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)。所述存储器120还可以包括上述种类的存储器的组合。
输入单元130可用于接收用户输入的数字或字符信息,包括开启WLAN热点指令、选择共享WLAN热点的终端的指令等。具体地,输入单元130可包括触控面板131以及其他输入设备132。触控面板131,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板131上或在触控面板131附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板631可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器160,并能接收处理器160发来的命令并加以执行。此外,输入单元130可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板131。除了触控面板131,输入单元130还可以包括其他输入设备132。具体地,其他输入设备132可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元140可用于显示由用户输入的信息或提供给用户的信息以及终端的各种菜单。显示单元140可包括显示屏141,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示屏141。进一步的,触控面板131可覆盖显示屏141,当触控面板131检测到在其上或附近的触摸操作后,传送给处理器160以确定触摸事件的类型,随后处理器160根据触摸事件的类型在显示屏141上提供相应的视觉输出。虽然在图1中,触控面板131与显示屏141是作为两个独立的部件来实现终端的输入和输入功能,但是在某些实施例中,可以将触控面板131与显示屏141集成而实现终端的输入和输出功能。
音频电路150、扬声器151,传声器152可提供用户与终端100之间的音频接口。音频电路150可将接收到的音频数据转换后的电信号,传输到扬声器151,由扬声器151转换为声音信号输出;另一方面,传声器152将收集的声音信号转换为电信号,由音频电路150接收后转换为音频数据,再将音频数据输出处理器160处理后,经RF电路110以发送给比如终端,或者将音频数据输出至存储器120以便进一步处理。
处理器160是终端的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器120内的软件程序和/或模块,以及调用存储在存储器120内的数据,执行如图2或图4所示的方法。可选的,处理器160可包括一个或多个处理单元。优选的,处理器160可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作***、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器160中。
WLAN模块170可用于帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带WLAN互联网访问。WLAN属于短距离无线传输技术,终端可通过WLAN模块170接入WLAN热点,也可通过WLAN模块170开启WLAN热点,将移动带宽业务转发给其他终端。WLAN模块170还可进行Wi-Fi广播和扫描,以实现与周围其他终端的无线通信。
终端还包括给各个部件供电的电源180(比如电池),可选的,电源可以通过电源管理***与处理器160逻辑相连,从而通过电源管理***实现管理充电、放电、以及功耗等功能。
蓝牙模块190,可以是低功耗蓝牙(Bluetooth Low Energy,BLE)设备,也可以是传统蓝牙设备,也可以是支持传统蓝牙和BLE的双模蓝牙设备。蓝牙模块190与其他终端的蓝牙模块建立BLE或经典蓝牙连接,蓝牙模块190还可进行BR或BLE广播和扫描,以实现与周围其他终端的无线通信。
尽管未示出,终端还可以包括摄像头、扬声器等,在此不再赘述。
在一个可能的实施例中,该终端包括处理器160和存储器120,存储器120用于存储程序指令;处理器160用于根据存储器120中存储的程序指令执行下述操作:如果终端检测到用户的手指接触到指纹传感器时,采集手指的指纹信息,该指纹信息包括指纹传感器的坏点信息,在匹配阈值满足预设的安全门限值时,根据指纹信息和已存储的指纹模板,计算匹配度;再根据匹配度和匹配阈值,则确定验证结果。其中,匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,指纹传感器的信息包括指纹传感器的尺寸和像素。
在一个可能的实施例中,其特征在于,处理器160还用于:根据坏点信息调整匹配阈值,该坏点信息包括坏点数量和坏点位置。
在一个可能的实施例中,其特征在于,处理器160具体用于:若匹配度大于或等于匹配阈值,则身份类验证功能验证成功;若匹配度小于匹配阈值,则身份类验证功能验证失败。
在一个可能的实施例中,处理器160还用于:若匹配阈值不满足预设的安全门限值,则禁用身份类验证功能。
在一个可能的实施例中,处理器160还用于:若位于指纹传感器的操作类功能的区域损坏,则禁用操作类功能。
本发明实施例提供的终端,在匹配阈值满足安全门限值时,处理器才对指纹进行匹配操作,计算匹配度。处理器再根据匹配度和匹配阈值,确定验证结果。进而通过指纹传感器增加的一个判别条件,设置的安全门限值,降低非法解锁问题发生的概率。
图2为本发明实施例提供的一种指纹传感器验证的方法的流程图。如图2所示,该指纹传感器的验证的方法包括:
步骤S201:若检测到手指接触指纹传感器时,则指纹传感器采集手指的指纹信息,其中,手指的指纹信息包括指纹传感器的坏点信息。
用户首次在终端上录入指纹时,指纹传感器会对放置在指纹传感器表面的用户手指进行指纹录入,一般会多录入几次,直到终端提醒录入完毕。在录入指纹之前,需要进入终端的设置指纹界面,用户需要创建一个数字密码或混合密码,当指纹传感器对指纹的验证失败时,用户可使用所设置的密码进行解锁。
指纹传感器和HOME键在终端上是可以组合为一个功能键,也可以分开设置。指纹传感器和HOME键合并为一个功能键,可设置在终端显示单元140的正下方,呈现在终端上的外观可以为圆形或四个角为弧形的长方形。指纹传感器和HOME键分开设置时,HOME键一般都是设置在显示屏141的正下方,可以为实体的按键,指纹传感器可以设置在终端的正面,背面,侧面,终端的正面是指设置有显示屏141的这一面,指纹传感器可以为实体的功能按键,实体的指纹传感器可以和电源键合并为一个功能键,也可以设置在终端背面,若指纹传感器不是实体的功能键,可设置在显示屏141上。
本发明实施例中,指纹传感器采集手指的指纹信息主要是对指纹图像的特征进行提取。特征提取是指纹识别鉴定过程中的核心算法,特征提取算法的任务是通过算法检测指纹图像中特征点的数量及每个特征点的类型、特征点的位置和特征点所在区域的纹线方向。特征点类型包括奇异点和细节点。奇异点和细节点的提取精度和准确程度决定指纹识别***的性能好坏,即识别率的高低。一般的指纹图像提取的特征点在10-100个之间,大多数文献均认为至少应该有12个特征点才能进行匹配。细节点是指指纹脊线的突变,一般常见的主要有如图3所示的几类,统计实验表明端点和分叉点是指纹中最常见的细节点。
本发明实施例采集手指的指纹信息,包括确定端点和分叉点的位置,然后通过比较特征点之间的相互关系来确定指纹是否匹配。
需要说明的是,在本发明实施例中主要以手指的指纹为例进行说明,
任何可以提取类似指纹特征信息的,该类似指纹特征信息是能有效代表用户身份的信息,都可以进行替换,在此不赘述。并且,采集手指的指纹信息可以还采用现有技术中的任一其他方法实现,在此不予赘述。
本发明实施例中,例如可以通过如下方式采集指纹传感器的坏点信息:下载不同配置的两张指纹传感器图像,其中,这里所述的配置是指纹传感器中的信号调理电路的参数配置,信号调理电路的参数包括偏置和增益,信号调理电路的配置不同获取到的指纹传感器的图像的各个点的灰度也会不同;对两张指纹传感器图像中位置相同的所有点进行比较,若被比较的点的灰度差值异常,则认为该点是坏点。
当然,获取指纹传感器中坏点的数量不限于此,还可以通过现有技术中的其他方式实现,在此不予赘述。
本发明实施例提供的指纹传感器的验证方法,是在终端已录入指纹之后,通过指纹对终端进行相应操作。
步骤S202:若匹配阈值满足预设的安全门限值,则根据手指的指纹信息和已存储的指纹模板计算匹配度;其中,匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定。
在采集到指纹传感器的坏点信息之后,可根据坏点信息动态调整匹配阈值,其中,坏点信息包括坏点数量和坏点位置,指纹传感器信息包括:传感器的尺寸、分辨率和像素中至少一个。考虑到坏点的特征信息会产生非法解锁问题,可根据指纹传感器的坏点信息适当的提高匹配阈值,也就是增加匹配成功难度。通过坏点信息和指纹传感器的信息,确定提高匹配阈值,可以降低非法解锁问题发生的概率。
假设,指纹传感器没有坏点时,匹配阈值为50%,用户用已经录入的手指的指纹去解锁终端,很轻易就可以达到50%的匹配度,解锁成功;但是用没有录入的手指指纹去解锁,就很难达到50%的匹配度,解锁失败。
当指纹传感器存在坏点时,不管用已录入的手指指纹还是未录入的手指指纹去解锁终端,都会增加非法解锁的概率。坏点信息,并非指纹本身的纹理特征,但是坏点信息包含在正确的指纹信息中,且在指纹匹配过程中对匹配结果影响很大。如果用未录入的手指指纹去解锁终端,匹配度有可能就很容易超过50%,从而存在非法解锁的风险。因此,在指纹传感器存在坏点时,可适当提高匹配阈值来降低非法解锁风险,例如当指纹传感器上出现一个坏点时,需要对50%的匹配阈值根据采集指纹传感器的坏点信息进行调整,调整后匹配阈值例如可以为60%。重新调整的匹配阈值与坏点的数量、坏点在指纹传感器上的位 置有关,当坏点数量固定时,由坏点在指纹传感器上的位置确定匹配阈值,如果坏点处的端点、交叉等经过图像处理会形成指纹图像的特征信息,那么匹配阈值则会在50%基础上调整的更多。
具体地,可以设定一个调整周期以根据采集的指纹信息来调整匹配阈值。例如可以在一个调整周期结束时对匹配阈值进行调整,在一个调整周期内,采集指纹传感器的坏点信息,在该一个调整周期结束时,根据在该一个调整周期内已采集的指纹传感器的坏点信息对原先的匹配阈值进行调整,而在该一个调整周期内原先的匹配阈值可以认为是固定不变的。
在实际应用中,当指纹传感器上的坏点数量过多时,指纹传感器不能无限制的调整匹配阈值,且即使根据坏点信息动态调整匹配阈值,也不能完全避免非法解锁问题。因此,本发明实施例中为匹配阈值设置了安全门限值,只有匹配阈值满足预设的安全门限值的要求,才可以启动指纹验证。
其中,安全门限值用于表示匹配阈值如果在安全门限值之下,则指纹传感器的通常不会发生非法解锁的问题。
如果采集用户手指的指纹信息的时刻位于匹配阈值的调整周期内,则判断当前的匹配阈值是否满足安全门限值,如果当前的匹配阈值满足安全门限值,则根据手指的指纹信息和已存储的指纹模板计算匹配度计算匹配度;该匹配阈值可以根据上一个调整周期采集的指纹传感器的坏点信息对调整周期内原先的匹配阈值进行调整得到的。
匹配阈值满足安全门限值是指指纹传感器的坏点处的端点、交叉等经过图像处理不会形成指纹图像的特征信息,且指纹传感器上的坏点数量没有超过允许范围。如果当前的匹配阈值超过安全门限值,则认为指纹的非法解锁问题已经不可控,此时可直接禁用指纹的解锁功能。在禁用指纹解锁功能的情况下,可通过输入字符密码进行解锁。
匹配阈值不满足安全门限值包括以下几种情况:
第一种情况:指纹传感器上的坏点数量超过预设数量;由于坏点数量超过预设数量,再根据坏点数量调整的匹配阈值已经不能满足安全门限值,该安全门限值可以由预设数量的坏点的个数确定。
第二种情况:指纹传感器上的坏点的端点、交叉等经过图像处理会形成指纹图像的特征信息,该特征信息会叠加在正常指纹图像上会形成新的特征信息,根据这些特征信息调整匹配阈值,调整后的匹配阈值不满足安全门限值。
在对匹配阈值进行动态调整过程中,调整周期是可以动态变化的。例如,在指纹传感器使用的初期,此时指纹传感器较新,出现坏点的可能性稍小,可以将调整周期设置的超长;在指纹传感器使用的后期,随着指纹传感器使用时间的延长,指纹传感器上出现的坏点可能性增加,此时,可以缩短调整周期。
需要说明的是,触发检测指纹传感器的坏点信息的机制包括并不限于定时、开关机、指纹解锁、指纹触控等操作,还可以利用终端上的环境光传感器、接近光传感器、加速度传感器、陀螺仪、霍尔器件等各种传感器综合判断,以此来寻找最佳的坏点检测时机,获取更准确的指纹坏点信息,从而对指纹状态做出更准确的判断。
步骤S203:根据匹配度和匹配阈值,确定验证结果。
在一个可能的实施例中,若匹配度大于或等于匹配阈值,验证成功。
在一个可能的实施例中,若匹配度小于匹配阈值,验证失败。
在本发明实施例中,指纹传感器的功能可以包括身份类验证功能和操作类功能,身份类验证功能,例如可以包括指纹解锁、指纹支付等需要对指纹进行匹配的功能;操作类功能,例如可以包括长按、单双击、滑动、拍照、接听电话等不需要进行指纹匹配的功能。
在使用中,若身份类验证功能验证失败,终端会指示用户重新按压指纹传感器,重新执行步骤S201-S203,若多次验证失败后,终端会锁定,用户此时按压指纹传感器,终端不会执行步骤S201-S203,而是提醒用户输入预先设置的数字或字符密码进行解锁。
需要说明的是,对指纹传感器功能的划分可以不按照上述的分类,可根据相似操作进行分类,不在此赘述。
具体的,步骤S201-步骤S203是对身份类验证功能的验证,在步骤S203中,若匹配度大于或等于匹配阈值,身份类验证功能验证成功;若匹配度小于匹配阈值,身份类验证功能验证失败。
在执行步骤S203之后,还可对操作类功能进行验证。操作类验证是通过指纹传感器上设置的特定区域或模块对用户的操作进行识别,若该特定区域或模块能识别用户的操作,则操作类功能是正常的;若不能有效识别用户的操作,则禁用操作类功能。
操作类功能验证包括以下几种方式:
第一种方式,在指纹传感器上设置特定区域,只需要确定指纹传感器划分的区域,该特定区域是用于识别手指指纹的滑动、点击等操作,当该特定区域中出现损坏时,就会影响指纹的滑动点击等操作类功能。如果该特定区域之外的地方损坏,就不会影响指纹的操作类功能。
第二种方式,利用图像采集模块,假设用户在实施滑动操作,可通过图像采集模块连续采集多帧图像,将采集的多帧图像进行对比,进而可通过图像的时间和位置确定滑动操作的方向,在模组受损影响连续采图或者多帧图像比对时,可通过算法判定操作类功能存在异常,故可通过图像采集模块对操作类功能进行验证。
第三种方式:在指纹模组传感器区域集成一个电容极板,该电容极板,用于识别手指的按压等操作。可根据电容极板的信号变化来识别按压等操作,进而可通过电容极板的信号是否存在异常对操作类功能进行验证。
以上三种只是示例说明,能有效识别用户操作的特征区域或模块,都可以进行等效替换,故在此不赘述。
具体地,如果身份类验证功能验证成功,可对操作类功能验证,如果操作类功能验证失败,表明用于识别手指指纹的滑动、点击等操作的区域损坏,此时,保留身份类验证功能,禁用操作类功能;如果操作类功能验证成功,即用于识别手指指纹的滑动、点击等操作的区域完好无损,那么身份类验证功能和操作类功能正常。
如果身份类验证功能验证失败,可对操作类功能验证,如果操作类功能验证失败,也就是用于识别手指指纹的滑动、点击等操作的区域出现损坏,则禁用身份类验证功能和操作类功能;如果操作类功能验证成功,也就是用于识别手指指纹的滑动、点击等操作的区域完好无损,那么禁用身份类验证功能保留操作类功能。
在使用中,若操作类验证失败,用户也需要重新对操作类进行验证。
需要说明的是,对身份类验证功能和操作类功能的验证是不分前后的,可以同时进行, 也可以先进行操作类功能的验证再进行身份类验证功能的验证。
本发明实施例提供一种指纹传感器功能的验证方法,在匹配阈值满足安全门限值时,才对指纹进行匹配操作,并计算匹配度。再根据匹配度和匹配阈值,确定验证结果。进而通过指纹传感器增加的一个判别条件,设置的安全门限值,降低非法解锁问题发生的概率。
图4为本发明实施例提供的一种动态调整匹配阈值的方法的流程图。如图4所示,该动态调整匹配阈值的方法可包括以下步骤:
步骤401:采集手指的指纹信息并检测指纹传感器坏点个数和坏点位置。
步骤S401中用户将手指与指纹传感器接触时,采集指纹的指纹信息该指纹信息包括指纹传感器的坏点信息,该指纹传感器的坏点信息可以先存储以在调整匹配阈值的时参考使用。
采集手指的指纹信息,主要是提取手指的指纹图像的特征信息,具体描述可参见步骤S201中的描述,在此不再赘述。
步骤S402:若检测到指纹传感器的坏点信息,则根据指纹传感器的坏点信息,重新计算匹配阈值。
步骤S403:判断匹配阈值是否满足安全门限值。
当匹配阈值满足安全门限值时,执行步骤S404:将采集到的指纹信息和已存储的指纹模板进行匹配验证,计算匹配度;当匹配阈值不满足安全门限值时,执行步骤411。
步骤S405:判断匹配度是否大于或等于匹配阈值,当匹配度小于匹配阈值时,执行步骤S406;当匹配度大于或等于匹配阈值时,执行步骤S407。
步骤S406:验证失败。
步骤S407:验证成功。
步骤S408:判断是否影响操作类功能。不影响,执行步骤S410;如果影响,执行步骤S409。
步骤S409:禁用操作类功能,保留其他不受影响的功能。
步骤S410:身份类验证功能和操作类功能正常。
步骤S411:禁用指纹身份类功能验证。
步骤S412:判断是否影响操作类功能。不影响,执行步骤S413;如果影响,执行步骤S414。
步骤S413:禁用身份验证功能,保留不受影响的其他功能。
步骤S414:指纹失效。
步骤S408:禁用身份类验证功能。
在本发明提供的动态调整匹配阈值的方法中,通过根据指纹传感器的坏点个数和坏点位置,对匹配阈值进行更新,降低非法解锁问题发生的概率。
图5为本发明实施例提供的另一种终端的结构示意图。如图5所示,该终端可包括:采集单元501、计算单元502和确定单元503。
采集单元501用于在将手指放置在指纹传感器上,采集用户手指的指纹信息,该指纹信息包括指纹传感器的坏点信息。
采集单元501,用于采集用户手指的指纹信息,该指纹信息包括指纹传感器的坏点信 息,与上述步骤S201描述相同,故不再赘述。
计算单元502:用于若匹配阈值满足预设的安全门限值,则根据手指的指纹信息和已存储的指纹模板,计算匹配度;其中,匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,指纹传感器的信息包括指纹传感器的尺寸和像素。
在一个可能的实施例中,计算单元502还用于:根据坏点信息调整匹配阈值,该坏点信息包括坏点数量和坏点位置。
计算单元502用于在调整周期结束时调整匹配阈值,与上述步骤S202描述相同,故不再赘述。
确定单元503,用于根据匹配度和匹配阈值,确定验证结果。
在一个可能的实施例中,若匹配度大于或等于匹配阈值,也就是匹配度大于或等于匹配阈值时,验证成功。
在一个可能的实施例中,若匹配度小于匹配阈值,也就是匹配度小于匹配阈值时,验证失败。
在本发明实施例中,指纹传感器的功能可以包括身份类验证功能和操作类功能,身份类验证功能,例如可以包括指纹解锁、指纹支付等需要对指纹进行匹配的功能;操作类功能,例如可以包括长按、单双击、滑动、拍照、接听电话等不需要进行指纹匹配的功能。
需要说明的是,对指纹传感器功能的划分可以不按照上述的分类,可根据相似操作进行分类,不在此赘述。
确定单元503具体用于,若匹配度大于或等于匹配阈值,身份类验证功能验证失败,需要禁用身份类验证功能;若匹配度小于匹配阈值,身份类验证功能失败。
确定单元503,还可用于对操作类功能进行验证。操作类功能不需要进行指纹匹配,只需确定指纹传感器划分的区域,该区域是用于识别手指指纹的滑动、点击等操作,当该区域中出现损坏时,就会影响指纹的滑动点击等操作类功能。如果该区域之外的地方损坏,就不会影响指纹的操作类功能。
确定单元503,用于对身份类功能和操作类功能进行验证,验证的过程和方式,与步骤S203描述相同,故不在此赘述。
本发明实施例提供的终端,在匹配阈值满足安全门限值时,计算单元才对指纹进行匹配操作,计算匹配度。确定单元再根据匹配度和匹配阈值,确定验证结果。进而通过指纹传感器增加的一个判别条件,设置的安全门限值,降低非法解锁问题发生的概率。
本发明实施例提供了一种包含指令的计算机程序产品,当所述指令在计算机上运行时,执行上述图2以及图4中的方法或步骤。
本发明实施例提供了一种计算机可读存储介质,用于存储指令,当所述指令在计算机上执行时,执行上述图2以及图4中的方法或步骤。
如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个 实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (17)

  1. 指纹传感器验证的方法,其特征在于,包括:
    采集用户手指的指纹信息,所述手指的指纹信息包括所述指纹传感器的坏点信息;
    若匹配阈值满足预设的安全门限值,则根据所述手指的指纹信息和已存储的指纹模板,计算匹配度;其中,所述匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,所述指纹传感器的信息包括指纹传感器的尺寸和像素;
    根据所述匹配度和所述匹配阈值确定验证结果。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    根据所述坏点信息调整所述匹配阈值,其中,所述坏点信息包括坏点数量和坏点位置。
  3. 根据权利要求1或2所述的方法,其特征在于,所述根据所述匹配度和所述匹配阈值确定验证结果,具体包括:
    若所述匹配度大于或等于所述匹配阈值,则所述指纹传感器的身份类验证功能验证成功;
    若所述匹配度小于所述匹配阈值,则所述指纹传感器的身份类验证功能验证失败。
  4. 根据权利要求1-3任一项所述的方法,其特征在于,所述方法还包括:
    若所述匹配阈值不满足所述预设的安全门限值,则禁用所述指纹传感器的身份类验证功能。
  5. 根据权利要求1-4任一项所述的方法,其特征在于是,所述方法还包括:
    若位于所述指纹传感器的操作类功能的区域的坏点数量超过预设数量,则禁用指纹传感器的操作类功能。
  6. 一种终端,其特征在于,包括:采集单元、计算单元和确定单元;
    所述采集单元,用于采集所述手指的指纹信息,所述手指的指纹信息包括所述指纹传感器的坏点信息;
    所述计算单元,用于若匹配阈值满足预设的安全门限值,则根据所述手指的指纹信息和已存储的指纹模板,计算匹配度;其中,所述匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,所述指纹传感器的信息包括指纹传感器的尺寸和像素;
    所述确定单元,用于根据所述匹配度和所述匹配阈值确定验证结果。
  7. 根据权利要求6所述的终端,其特征在于,所述计算单元还用于:
    根据所述坏点信息调整所述匹配阈值,其中,所述坏点信息包括坏点数量和坏点位置。
  8. 根据权利要求6或7所述的终端,其特征在于,所述确定单元具体用于:
    若所述匹配度大于或等于所述匹配阈值,则所述指纹传感器的身份类验证功能验证成功;
    若所述匹配度小于所述匹配阈值,则所述指纹传感器的身份类验证功能验证失败。
  9. 根据权利要求6-8任一项所述的终端,其特征在于,所述确定单元还用于:
    若所述匹配阈值不满足所述预设的安全门限值,则禁用所述指纹传感器的身份类验证功能。
  10. 根据权利要求6-9任一项所述的终端,其特征在于是,所述确定单元还用于:
    若位于所述指纹传感器的操作类功能的区域的坏点数量超过预设数量,则指纹传感器的禁用所述操作类功能。
  11. 一种终端,其特征在于,包括:处理器和存储器;
    所述存储器,用于存储程序指令;
    所述处理器,用于根据所述存储器存储的所述程序指令执行以下步骤:
    采集所述手指的指纹信息,所述手指的指纹信息包括所述指纹传感器的坏点信息;
    若匹配阈值满足预设的安全门限值,则根据所述手指的指纹信息和已存储的指纹模板,计算匹配度;其中,所述匹配阈值根据指纹传感器的坏点信息和指纹传感器的信息确定,所述指纹传感器的信息包括指纹传感器的尺寸和像素;
    根据所述匹配度和所述匹配阈值确定验证结果。
  12. 根据权利要求11所述的终端,其特征在于,所述处理器还用于:
    根据所述坏点信息调整所述匹配阈值,其中,所述坏点信息包括坏点数量和坏点位置。
  13. 根据权利要求11或12所述的终端,其特征在于,所述处理器具体用于:
    若所述匹配度大于或等于所述匹配阈值,则所述指纹传感器的身份类验证功能验证成功;
    若所述匹配度小于所述匹配阈值,则所述指纹传感器的身份类验证功能验证失败。
  14. 根据权利要求11-13任一项所述的终端,其特征在于,所述处理器还用于:
    若所述匹配阈值不满足预设的安全门限值,则禁用所述身份类验证功能。
  15. 根据权利要求11-14任一项所述的终端,其特征在于是,所述处理器还用于:
    若位于所述指纹传感器的操作类功能的区域坏点超过预设数量,则指纹传感器的禁用操作类功能。
  16. 一种计算机可读存储介质,包括计算机可读指令,当计算机读取并执行所述计算机可读指令时,使得计算机执行如权利要求1-5任意一项所述的方法。
  17. 一种计算机程序产品,包括计算机可读指令,当计算机读取并执行所述计算机可读指令,使得计算机执行如权利要求1-5任意一项所述的方法。
PCT/CN2017/099966 2017-08-31 2017-08-31 指纹传感器功能的验证方法及终端 WO2019041243A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/099966 WO2019041243A1 (zh) 2017-08-31 2017-08-31 指纹传感器功能的验证方法及终端
CN201780064703.2A CN109844764B (zh) 2017-08-31 2017-08-31 指纹传感器功能的验证方法及终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/099966 WO2019041243A1 (zh) 2017-08-31 2017-08-31 指纹传感器功能的验证方法及终端

Publications (1)

Publication Number Publication Date
WO2019041243A1 true WO2019041243A1 (zh) 2019-03-07

Family

ID=65524868

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/099966 WO2019041243A1 (zh) 2017-08-31 2017-08-31 指纹传感器功能的验证方法及终端

Country Status (2)

Country Link
CN (1) CN109844764B (zh)
WO (1) WO2019041243A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472393A (zh) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 基于生物识别的信息显示方法、装置、存储介质和设备
CN111947702A (zh) * 2020-07-16 2020-11-17 中广核核电运营有限公司 传感器交叉验证故障诊断方法、装置、计算机设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112382229A (zh) * 2019-07-29 2021-02-19 浙江宇视科技有限公司 Led显示屏的控制方法、装置、设备及存储介质
CN112560645A (zh) * 2020-12-11 2021-03-26 维沃移动通信有限公司 状态控制方法、装置和电子设备
CN114212050A (zh) * 2021-12-15 2022-03-22 深圳市致知行科技有限公司 一种基于电容式感应实现车门解锁的控制方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7126631B1 (en) * 1999-06-30 2006-10-24 Intel Corporation Sensing with defective cell detection
CN105469083A (zh) * 2015-11-13 2016-04-06 广东欧珀移动通信有限公司 指纹图像处理方法、装置和终端设备
CN105809133A (zh) * 2016-03-08 2016-07-27 广东欧珀移动通信有限公司 指纹特征信息更新方法及装置
CN105991997A (zh) * 2015-03-06 2016-10-05 成都方程式电子有限公司 一种电容式图像传感器坏点实时定位的方法

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101032863B1 (ko) * 2009-07-01 2011-05-06 주식회사 슈프리마 복수의 지문센서를 구비한 지문인증장치 및 방법
US9442833B1 (en) * 2010-07-20 2016-09-13 Qualcomm Incorporated Managing device identity
CN103745148B (zh) * 2014-01-26 2017-06-27 广东欧珀移动通信有限公司 一种基于指纹识别的信息保护方法及移动终端
CN105227307A (zh) * 2014-06-03 2016-01-06 阿里巴巴集团控股有限公司 身份验证方法与***以及服务器数据处理方法和服务器
CN105608357A (zh) * 2015-07-30 2016-05-25 宇龙计算机通信科技(深圳)有限公司 指纹验证方法、指纹验证装置和终端
CN106709399B (zh) * 2015-08-21 2021-02-09 小米科技有限责任公司 指纹识别方法及装置
CN105138132A (zh) * 2015-08-31 2015-12-09 宇龙计算机通信科技(深圳)有限公司 基于指纹识别的触控方法、装置及终端
CN105468955A (zh) * 2015-12-28 2016-04-06 深圳市亚略特生物识别科技有限公司 基于生物识别的移动终端及电子***
CN106934320B (zh) * 2015-12-29 2020-03-17 小米科技有限责任公司 指纹识别方法及装置
CN105786577A (zh) * 2016-03-22 2016-07-20 上海斐讯数据通信技术有限公司 指纹移动终端快速拍照的方法、装置及指纹移动终端
CN105956553B (zh) * 2016-04-28 2019-12-06 Oppo广东移动通信有限公司 一种解锁方法及移动终端
CN106096539B (zh) * 2016-06-07 2018-03-27 广东欧珀移动通信有限公司 一种进行生物识别的方法及终端
CN106201066B (zh) * 2016-06-24 2019-02-12 Oppo广东移动通信有限公司 信息的验证方法、装置及终端
CN106201022B (zh) * 2016-06-24 2019-01-15 维沃移动通信有限公司 一种移动终端的处理方法及移动终端
CN106681552A (zh) * 2016-11-18 2017-05-17 乐视控股(北京)有限公司 控制车载***的方法、装置和车载***及其控制方法、装置
CN106909893B (zh) * 2017-02-09 2020-12-29 北京小米移动软件有限公司 指纹识别方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7126631B1 (en) * 1999-06-30 2006-10-24 Intel Corporation Sensing with defective cell detection
CN105991997A (zh) * 2015-03-06 2016-10-05 成都方程式电子有限公司 一种电容式图像传感器坏点实时定位的方法
CN105469083A (zh) * 2015-11-13 2016-04-06 广东欧珀移动通信有限公司 指纹图像处理方法、装置和终端设备
CN105809133A (zh) * 2016-03-08 2016-07-27 广东欧珀移动通信有限公司 指纹特征信息更新方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472393A (zh) * 2019-07-18 2019-11-19 平安科技(深圳)有限公司 基于生物识别的信息显示方法、装置、存储介质和设备
CN111947702A (zh) * 2020-07-16 2020-11-17 中广核核电运营有限公司 传感器交叉验证故障诊断方法、装置、计算机设备
CN111947702B (zh) * 2020-07-16 2022-03-18 中广核核电运营有限公司 传感器交叉验证故障诊断方法、装置、计算机设备

Also Published As

Publication number Publication date
CN109844764A (zh) 2019-06-04
CN109844764B (zh) 2021-12-28

Similar Documents

Publication Publication Date Title
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
EP3252663B1 (en) Method for controlling unlocking and terminal
WO2019041243A1 (zh) 指纹传感器功能的验证方法及终端
US10061969B2 (en) Fingerprint unlocking method and terminal
US10467451B2 (en) Method for controlling unlocking and terminal
EP3252661B1 (en) Method for controlling unlocking terminal and corresponding terminal
US11290447B2 (en) Face verification method and device
US10061970B2 (en) Method for controlling unlocking and mobile terminal
US9965086B2 (en) Method for enabling function module of terminal, and terminal device
CN107592419A (zh) 基于指纹传感器的显示屏唤醒方法、装置及移动终端
US10885294B2 (en) Finger print sensor with passive proximity detection for power savings in an electronic device
WO2019101096A1 (zh) 安全验证的方法、装置及移动终端
CN105912916B (zh) 一种指纹解锁方法及终端
US20170344781A1 (en) Method for Controlling Unlocking and Terminal
CN110287666B (zh) 指纹解锁的方法及相关装置
WO2014183370A1 (en) Systems and methods for user login
US11354391B2 (en) Power saving in device with ultrasonic fingerprint sensors
WO2019033867A1 (zh) 一种输入方法、装置及电子设备
CN115098845A (zh) 免密登录方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17923968

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17923968

Country of ref document: EP

Kind code of ref document: A1