[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109325338B - Verification method and terminal - Google Patents

Verification method and terminal Download PDF

Info

Publication number
CN109325338B
CN109325338B CN201811453271.7A CN201811453271A CN109325338B CN 109325338 B CN109325338 B CN 109325338B CN 201811453271 A CN201811453271 A CN 201811453271A CN 109325338 B CN109325338 B CN 109325338B
Authority
CN
China
Prior art keywords
finger
preset
pattern information
fingerprint
fingerprint pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811453271.7A
Other languages
Chinese (zh)
Other versions
CN109325338A (en
Inventor
方达冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811453271.7A priority Critical patent/CN109325338B/en
Publication of CN109325338A publication Critical patent/CN109325338A/en
Application granted granted Critical
Publication of CN109325338B publication Critical patent/CN109325338B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a verification method and a terminal, wherein the method comprises the following steps: acquiring fingerprint information for identity authentication input by a user, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space; and if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed. The embodiment of the invention verifies the information of at least two fingerprint patterns and increases the distance between the fingers as the verification content of the password, thereby improving the difficulty of copying the verification content and effectively improving the security of the password.

Description

Verification method and terminal
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to a verification method and a terminal.
Background
The password can protect the privacy information and/or property security of the user, and the current password mainly comprises a character password, a fingerprint password and the like. When the user uses the character password in public places, the character password is easy to be peeped by surrounding people; or pressing traces can be left after the fixed keys corresponding to the character passwords are pressed for many times, and the character passwords are easy to be stolen maliciously by others. In addition, fingerprints, which are human biometrics, can be copied or forged, and thus a single fingerprint password is easily revealed.
It can be seen that the security of the current password is low, and how to improve the security of the password becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the invention provides a verification method and a terminal, and aims to solve the problem of low password security in the prior art.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a verification method, which is applied to a terminal, and the method includes:
acquiring fingerprint information for identity authentication input by a user, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space;
and if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed.
In a second aspect, an embodiment of the present invention provides a terminal, where the terminal includes:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring fingerprint information for identity verification input by a user, and the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space;
and the verification module is used for passing the identity verification if the at least two fingerprint pattern information are respectively matched with at least two preset fingerprint pattern information and the at least one finger space is matched with the at least one preset finger space.
In a third aspect, an embodiment of the present invention provides another terminal, which includes a processor, a memory, and a computer program stored in the memory and executable on the processor, where the computer program implements the steps of the authentication method when executed by the processor.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the above-mentioned authentication method.
In the embodiment of the invention, the authentication method acquires fingerprint information for identity authentication input by a user, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space; and if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed. Therefore, at least two pieces of fingerprint pattern information are verified, the distance between the fingers is increased to serve as verification content of the password, the difficulty of copying the verification content is improved, and the safety of the password can be effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow chart of a verification method provided by an embodiment of the invention;
FIG. 2 is a second flowchart of a verification method according to an embodiment of the present invention;
fig. 3 is a structural diagram of a terminal provided in an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of an authentication method provided in an embodiment of the present invention, where the authentication method is applied to a terminal, and as shown in fig. 1, the authentication method includes the following steps:
step 101, fingerprint information for identity authentication input by a user is acquired, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space.
In the embodiment of the invention, when the identity needs to be verified, the terminal acquires fingerprint information input by a user, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space. The mode of the terminal for acquiring the fingerprint information input by the user can be to acquire the fingerprint information directly input by the user on the terminal, and can also be to receive the fingerprint information input by the user and sent by other terminals. In some embodiments of the present invention, when the screen of the terminal supports a fingerprint identification function, the screen of the terminal may be used as the fingerprint acquisition device, and the user may directly input the fingerprint information on the screen of the terminal.
The fingerprint information includes at least two fingerprint pattern information and at least one finger space, and the at least one finger space may include a finger space between any two fingers of at least two fingers corresponding to the at least two fingerprint pattern information. The finger space may be the narrowest space between the fingerprint patterns of the two fingers, the widest space between the fingerprint patterns of the two fingers, an average value of a plurality of different spaces between the fingerprint patterns of the two fingers (for example, an average value of the narrowest space and the widest space), or a space between center points of the fingerprint patterns of the two fingers.
And 102, if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed.
In this step, the terminal judges whether the acquired fingerprint information matches with preset fingerprint information, and if the fingerprint information matches with the preset fingerprint information, the identity authentication is passed. The preset fingerprint information comprises at least two preset fingerprint pattern information and at least one preset finger distance, if the at least two fingerprint pattern information are respectively matched with the at least two preset fingerprint pattern information, and the at least one finger distance is matched with the at least one preset finger distance, the fingerprint information is determined to be matched with the preset fingerprint information, and the identity authentication is passed.
For example, assuming that the preset fingerprint information includes fingerprint pattern information a1, fingerprint pattern information B1 and finger space K1, the fingerprint information acquired by the terminal through the above step 101 includes fingerprint pattern information a2, fingerprint pattern information B2 and finger space K2. When the fingerprint pattern information a2 is matched with the fingerprint pattern information a1, the fingerprint pattern information B2 is matched with the fingerprint pattern information B1, and the finger distance K2 is matched with the finger distance K1, it is determined that the fingerprint information is matched with the preset fingerprint information.
In the embodiment of the present invention, the determining whether the distance between the fingers matches the preset distance may include: and judging whether the difference value between the finger distance and the preset finger distance is larger than a preset threshold value or not, and if the difference value between the finger distance and the preset finger distance is smaller than or equal to the preset threshold value, determining that the finger distance is matched with the preset finger distance. The preset threshold may be a preset error value or a default error value.
In some embodiments of the present invention, the user may set the preset fingerprint information by performing multiple touches on the fingerprint acquisition device of the terminal. Specifically, the following description will be given taking an example in which the preset fingerprint information includes two fingerprint pattern information and one finger pitch. If the user wants to set the fingerprint pattern information of the first finger, the fingerprint pattern information of the second finger, and the distance between the first finger and the second finger as preset fingerprint information, the first finger and the second finger may be used to perform multiple touches on the fingerprint acquisition device of the terminal. Correspondingly, based on each touch of the user, the terminal acquires the data acquired by the fingerprint acquisition device, and then determines and stores the preset fingerprint information according to the data acquired for multiple times. The terminal can calculate the average value of the finger distances acquired for multiple times as the finger distance in the preset fingerprint information. In some embodiments of the present invention, the terminal may further calculate a finger distance error value (i.e., the preset threshold value) according to the data acquired for multiple times and the determined finger distance in the preset fingerprint information.
It can be understood that, in the embodiment of the present invention, no matter what way is adopted to determine the finger distance between two fingers, it is only required to ensure that the determination way of the finger distance in the preset fingerprint information is consistent with the determination way of the finger distance in the password verification process. For example, assuming that the finger distance between the first finger and the second finger in the preset fingerprint information is determined by the distance between the center points of the fingerprint pattern information of the two fingers, the finger distance between the two fingers also needs to be determined according to the distance between the center points of the fingerprint pattern information of the two fingers in the password authentication process.
It should be noted that the authentication method provided by the embodiment of the present invention may be applied to any authentication scenario of the terminal, for example, the authentication method may be used for unlocking authentication of the terminal (such as system unlocking, application unlocking, and file decryption), and may also be used for payment authentication.
In this embodiment of the present invention, the terminal may be a mobile terminal, for example: mobile phones, Tablet Personal computers (Tablet Personal Computer), Laptop computers (Laptop Computer), Personal Digital Assistants (PDA), Mobile Internet Devices (MID) or Wearable devices (Wearable Device), digital cameras, and the like; or may be a fixed terminal such as a computer or the like.
In this embodiment, the authentication method obtains fingerprint information for performing identity authentication, which is input by a user, where the fingerprint information includes at least two pieces of fingerprint pattern information and at least one finger space; and if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed. Therefore, at least two pieces of fingerprint pattern information are verified, the distance between the fingers is increased to serve as identity verification content, the difficulty of copying the verification content is improved, and the safety of the password can be effectively improved.
Optionally, the fingerprint information comprises two fingerprint pattern information and one finger space;
if the at least two fingerprint pattern information match with at least two preset fingerprint pattern information respectively, and the at least one finger space matches with the at least one preset finger space, then authentication passes, including:
if the two pieces of fingerprint pattern information are respectively matched with two pieces of preset fingerprint pattern information, and the distance between one finger is matched with a target finger distance in at least two preset finger distances, the identity authentication is passed, and a grade authority corresponding to the target finger distance is provided;
wherein, different preset finger distances correspond to different levels of authority.
In this embodiment, the fingerprint information includes two pieces of fingerprint pattern information and a finger space, and the preset fingerprint information includes two pieces of preset fingerprint pattern information and at least two pieces of preset finger space, where different preset finger spaces correspond to different levels of permissions. And if the two pieces of fingerprint pattern information are matched with the two pieces of preset fingerprint pattern information, and the distance between one finger is matched with the target distance between the at least two fingers, the identity authentication is passed, and the terminal provides the grade authority corresponding to the target distance between the fingers.
Therefore, by setting different finger intervals, the user can input different finger intervals to open the authorities of different levels, and the requirement that the user needs to open the authorities of different levels under different scenes can be met, so that convenience is provided for the user.
Referring to fig. 2, fig. 2 is a second flowchart of an authentication method provided in an embodiment of the present invention, where the method is applied to a terminal, and a main difference between the present embodiment and the previous embodiment is that the fingerprint information in the present embodiment includes at least three pieces of fingerprint pattern information, as shown in fig. 2, including the following steps:
step 201, fingerprint information for identity authentication input by a user is acquired, wherein the fingerprint information includes at least three pieces of fingerprint pattern information and at least one finger space.
Step 201 is similar to step 101 in the embodiment shown in fig. 1 of the present invention, and the difference is only that the number of fingerprint pattern information included in the fingerprint information is different, and for the detailed description of step 202, please refer to the detailed description of step 101, which is not described herein again.
Step 202, if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with one preset finger space group, the identity authentication is passed, wherein each preset finger space group comprises at least one preset finger space.
In this step, if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with one preset finger space group, the identity authentication is passed. Each preset finger interval group comprises at least one preset finger interval group, and it can be understood that the number of the acquired finger intervals is the same as the number of the preset finger intervals included in each preset finger interval group. For example, if each finger space group includes a preset finger space, the fingerprint information includes a finger space; assuming that each finger space group includes two finger spaces, the fingerprint information includes two finger spaces.
The matching of the at least one finger space with a preset finger space group comprises: and each finger space in the at least one finger space is matched with each preset finger space in the preset finger space group. For example, it is assumed that the preset fingerprint information includes fingerprint pattern information a1, fingerprint pattern information B1, fingerprint pattern information C1, and a preset finger space group K, where the preset finger space group K includes a finger space K1 between two fingers corresponding to the fingerprint pattern information a1 and the fingerprint pattern information B1, respectively, and a finger space K2 between two fingers corresponding to the fingerprint pattern information B1 and the fingerprint pattern information C1, respectively. If the fingerprint pattern information A2 in the fingerprint information acquired by the terminal is matched with the fingerprint pattern information A1, the fingerprint pattern information B2 is matched with the fingerprint pattern information B1, and the fingerprint pattern information C2 is matched with the fingerprint pattern information C1. It is determined that the two finger pitches in the fingerprint information match the preset finger pitch group K when the finger pitch K3 between the two fingers corresponding to the fingerprint pattern information a2 and the fingerprint pattern information B2, respectively, matches the finger pitch K1, and the finger pitch K4 between the two fingers corresponding to the fingerprint pattern information B2 and the fingerprint pattern information C2, respectively, matches the finger pitch K2.
In this embodiment, the authentication method obtains fingerprint information for performing identity authentication input by a user, where the fingerprint information includes at least three pieces of fingerprint pattern information and at least one finger space, and if the at least three pieces of fingerprint pattern information are respectively matched with at least three pieces of preset fingerprint pattern information and the at least one finger space is matched with one preset finger space group, the identity authentication is passed, where each preset finger space group includes at least one preset finger space. Therefore, at least three fingerprint pattern information are verified, the distance between the fingers is increased to serve as the verification content of the password, the difficulty of copying the verification content is improved, and the safety of the password can be effectively improved.
Optionally, if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with one preset finger space group, the authentication is passed, including:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with a target finger space group in at least two preset finger space groups, the identity authentication is passed, and a grade authority corresponding to the target finger space group is provided;
wherein, different preset finger spacing groups correspond to different levels of authority.
In this embodiment, the preset fingerprint information includes at least three fingerprint pattern information and at least two preset finger space groups, where different preset finger space groups correspond to different levels of permissions. And if the at least three fingerprint pattern information is matched with the at least three preset fingerprint pattern information and the at least one finger space is matched with a target finger space group in the at least two preset finger space groups, the identity authentication is passed and the terminal provides the grade authority corresponding to the target finger space group.
Therefore, the user can open the authorities at different levels by adjusting the distance between the fingers, the requirement that the user needs to open the authorities at different levels in different scenes can be met, and convenience is provided for the user.
Referring to fig. 3, fig. 3 is a structural diagram of a terminal according to an embodiment of the present invention, which can implement details of the authentication method in the foregoing embodiment and achieve the same effect. As shown in fig. 3, the terminal 300 includes an obtaining module 301 and an authenticating module 302 connected to the obtaining module 301, wherein:
an obtaining module 301, configured to obtain fingerprint information for performing identity authentication, where the fingerprint information includes at least two pieces of fingerprint pattern information and at least one finger space;
the verification module 302 is configured to pass the identity verification if the at least two fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information and the at least one finger space is matched with the at least one preset finger space.
Optionally, the fingerprint information comprises two fingerprint pattern information and one finger space;
the verification module 302 is specifically configured to:
if the two pieces of fingerprint pattern information are respectively matched with two pieces of preset fingerprint pattern information, and the distance between one finger is matched with a target finger distance in at least two preset finger distances, the identity authentication is passed, and a grade authority corresponding to the target finger distance is provided;
wherein, different preset finger distances correspond to different levels of authority.
Optionally, the fingerprint information comprises at least three fingerprint pattern information and at least one finger separation;
the verification module 302 is specifically configured to:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with one preset finger space group, the identity authentication is passed;
wherein each preset finger space group comprises at least one preset finger space.
Optionally, the verification module 302 is specifically configured to:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with a target finger space group in at least two preset finger space groups, the identity authentication is passed, and a grade authority corresponding to the target finger space group is provided;
wherein, different preset finger spacing groups correspond to different levels of authority.
In this embodiment, the terminal acquires fingerprint information for performing identity authentication, which is input by a user, wherein the fingerprint information includes at least two pieces of fingerprint pattern information and at least one finger space; and if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed. Therefore, at least two pieces of fingerprint pattern information are verified, the distance between the fingers is increased to serve as verification content of the password, the difficulty of copying the verification content is improved, and the safety of the password can be effectively improved.
Fig. 4 is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention, as shown in fig. 4, the terminal 400 includes, but is not limited to: radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, user input unit 407, interface unit 408, memory 409, processor 410, and power supply 411. Those skilled in the art will appreciate that the terminal configuration shown in fig. 4 is not intended to be limiting, and that the terminal may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Wherein, the processor 410 is configured to:
acquiring fingerprint information for identity authentication input by a user, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space;
and if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed.
Optionally, the fingerprint information comprises two fingerprint pattern information and one finger space;
if the at least two fingerprint pattern information matches with at least two preset fingerprint pattern information respectively and the at least one finger space matches with the at least one preset finger space, the authentication is passed, which includes:
if the two pieces of fingerprint pattern information are respectively matched with two pieces of preset fingerprint pattern information, and the distance between one finger is matched with a target finger distance in at least two preset finger distances, the identity authentication is passed, and a grade authority corresponding to the target finger distance is provided;
wherein, different preset finger distances correspond to different levels of authority.
Optionally, the fingerprint information comprises at least three fingerprint pattern information and at least one finger separation;
if the at least two fingerprint pattern information matches with at least two preset fingerprint pattern information respectively and the at least one finger space matches with the at least one preset finger space, the authentication is passed, which includes:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with one preset finger space group, the identity authentication is passed;
wherein each preset finger space group comprises at least one preset finger space.
Optionally, if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information and the at least one finger space is matched with a preset finger space group, the authentication passing executed by the processor 410 includes:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with a target finger space group in at least two preset finger space groups, the identity authentication is passed, and a grade authority corresponding to the target finger space group is provided;
wherein, different preset finger spacing groups correspond to different levels of authority.
In the embodiment of the invention, a terminal acquires fingerprint information for identity authentication input by a user, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space; and if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed. Therefore, at least two pieces of fingerprint pattern information are verified, the distance between the fingers is increased to serve as verification content of the password, the difficulty of copying the verification content is improved, and the safety of the password can be effectively improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 401 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 410; in addition, the uplink data is transmitted to the base station. Typically, radio unit 401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio unit 401 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 402, such as helping the user send and receive e-mails, browse web pages, and access streaming media.
The audio output unit 403 may convert audio data received by the radio frequency unit 401 or the network module 402 or stored in the memory 409 into an audio signal and output as sound. Also, the audio output unit 403 may also provide audio output related to a specific function performed by the terminal 400 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 403 includes a speaker, a buzzer, a receiver, and the like.
The input unit 404 is used to receive audio or video signals. The input Unit 404 may include a Graphics Processing Unit (GPU) 4041 and a microphone 4042, and the Graphics processor 4041 processes image data of a still picture or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 406. The image frames processed by the graphic processor 4041 may be stored in the memory 409 (or other storage medium) or transmitted via the radio frequency unit 401 or the network module 402. The microphone 4042 may receive sound, and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 401 in case of the phone call mode.
The terminal 400 also includes at least one sensor 405, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 4061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 4061 and/or a backlight when the terminal 400 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 405 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which will not be described in detail herein.
The display unit 406 is used to display information input by the user or information provided to the user. The Display unit 406 may include a Display panel 4061, and the Display panel 4061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 407 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 407 includes a touch panel 4071 and other input devices 4072. Touch panel 4071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 4071 using a finger, a stylus, or any suitable object or attachment). The touch panel 4071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 410, receives a command from the processor 410, and executes the command. In addition, the touch panel 4071 can be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 4071, the user input unit 407 may include other input devices 4072. Specifically, the other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 4071 can be overlaid on the display panel 4061, and when the touch panel 4071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 410 to determine the type of the touch event, and then the processor 410 provides a corresponding visual output on the display panel 4061 according to the type of the touch event. Although in fig. 4, the touch panel 4071 and the display panel 4061 are two independent components to implement the input and output functions of the terminal, in some embodiments, the touch panel 4071 and the display panel 4061 may be integrated to implement the input and output functions of the terminal, which is not limited herein.
The interface unit 408 is an interface for connecting an external device to the terminal 400. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 408 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 400 or may be used to transmit data between the terminal 400 and an external device.
The memory 409 may be used to store software programs as well as various data. The memory 409 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 409 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 410 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 409 and calling data stored in the memory 409, thereby integrally monitoring the terminal. Processor 410 may include one or more processing units; preferably, the processor 410 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The terminal 400 may further include a power supply 411 (e.g., a battery) for supplying power to various components, and preferably, the power supply 411 may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the terminal 400 includes some functional modules that are not shown, and are not described in detail herein.
Preferably, an embodiment of the present invention further provides a terminal, which includes a processor 410, a memory 409, and a computer program that is stored in the memory 409 and can be run on the processor 410, and when being executed by the processor 410, the computer program implements each process of the foregoing verification method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the foregoing verification method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. An authentication method applied to a terminal, the method comprising:
acquiring fingerprint information for identity authentication input by a user, wherein the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space;
if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information, and the at least one finger space is matched with the at least one preset finger space, the identity authentication is passed, wherein the fingerprint information comprises two pieces of fingerprint pattern information and one finger space;
if the at least two fingerprint pattern information match with at least two preset fingerprint pattern information respectively, and the at least one finger space matches with the at least one preset finger space, then authentication passes, including:
if the two pieces of fingerprint pattern information are respectively matched with two pieces of preset fingerprint pattern information, and the distance between one finger is matched with a target finger distance in at least two preset finger distances, the identity authentication is passed, and a grade authority corresponding to the target finger distance is provided;
wherein different preset finger distances correspond to different levels of authority;
based on each touch of a user, the terminal acquires data acquired by the fingerprint acquisition device, then determines preset fingerprint information according to the data acquired for multiple times and stores the preset fingerprint information, calculates an average value of finger intervals acquired for multiple times as a finger interval in the preset fingerprint information, and calculates a finger interval error value according to the data acquired for multiple times and the determined finger interval in the preset fingerprint information.
2. The authentication method as claimed in claim 1, wherein the fingerprint information includes at least three fingerprint pattern information and at least one finger space;
if the at least two fingerprint pattern information match with at least two preset fingerprint pattern information respectively, and the at least one finger space matches with the at least one preset finger space, then authentication passes, including:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with one preset finger space group, the identity authentication is passed;
wherein each preset finger space group comprises at least one preset finger space.
3. The method of claim 2, wherein if the at least three fingerprint pattern information matches at least three predetermined fingerprint pattern information respectively and the at least one finger space matches a predetermined finger space group, the passing of the identity authentication comprises:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with a target finger space group in at least two preset finger space groups, the identity authentication is passed, and a grade authority corresponding to the target finger space group is provided;
wherein, different preset finger spacing groups correspond to different levels of authority.
4. A terminal, characterized in that the terminal comprises:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring fingerprint information for identity verification input by a user, and the fingerprint information comprises at least two pieces of fingerprint pattern information and at least one finger space;
the verification module is used for passing identity verification if the at least two pieces of fingerprint pattern information are respectively matched with at least two pieces of preset fingerprint pattern information and the at least one finger space is matched with the at least one preset finger space, wherein the fingerprint information comprises two pieces of fingerprint pattern information and one finger space;
the verification module is specifically configured to:
if the two pieces of fingerprint pattern information are respectively matched with two pieces of preset fingerprint pattern information, and the distance between one finger is matched with a target finger distance in at least two preset finger distances, the identity authentication is passed, and a grade authority corresponding to the target finger distance is provided;
wherein different preset finger distances correspond to different levels of authority;
based on each touch of a user, the terminal acquires data acquired by the fingerprint acquisition device, then determines preset fingerprint information according to the data acquired for multiple times and stores the preset fingerprint information, calculates an average value of finger intervals acquired for multiple times as a finger interval in the preset fingerprint information, and calculates a finger interval error value according to the data acquired for multiple times and the determined finger interval in the preset fingerprint information.
5. The terminal of claim 4, wherein the fingerprint information includes at least three fingerprint pattern information and at least one finger separation;
the verification module is specifically configured to:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with one preset finger space group, the identity authentication is passed;
wherein each preset finger space group comprises at least one preset finger space.
6. The terminal of claim 5, wherein the authentication module is specifically configured to:
if the at least three fingerprint pattern information are respectively matched with at least three preset fingerprint pattern information, and the at least one finger space is matched with a target finger space group in at least two preset finger space groups, the identity authentication is passed, and a grade authority corresponding to the target finger space group is provided;
wherein, different preset finger spacing groups correspond to different levels of authority.
7. A terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the authentication method according to any one of claims 1 to 3.
8. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the authentication method according to any one of claims 1 to 3.
CN201811453271.7A 2018-11-30 2018-11-30 Verification method and terminal Active CN109325338B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811453271.7A CN109325338B (en) 2018-11-30 2018-11-30 Verification method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811453271.7A CN109325338B (en) 2018-11-30 2018-11-30 Verification method and terminal

Publications (2)

Publication Number Publication Date
CN109325338A CN109325338A (en) 2019-02-12
CN109325338B true CN109325338B (en) 2021-01-08

Family

ID=65255933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811453271.7A Active CN109325338B (en) 2018-11-30 2018-11-30 Verification method and terminal

Country Status (1)

Country Link
CN (1) CN109325338B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105872250A (en) * 2016-05-30 2016-08-17 努比亚技术有限公司 Method and device for automatically recognizing owner identity of mobile terminal
CN105980973A (en) * 2014-01-30 2016-09-28 微软技术许可有限责任公司 User-authentication gestures
CN106066956A (en) * 2016-05-27 2016-11-02 广东欧珀移动通信有限公司 A kind of user terminal screen unlocking method, device and user terminal
CN106126997A (en) * 2016-06-13 2016-11-16 深圳市九洲电器有限公司 A kind of terminal unit fingerprint recognition management method and system
CN107315935A (en) * 2016-04-27 2017-11-03 中兴通讯股份有限公司 A kind of recognition methods of many fingerprints and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105980973A (en) * 2014-01-30 2016-09-28 微软技术许可有限责任公司 User-authentication gestures
CN107315935A (en) * 2016-04-27 2017-11-03 中兴通讯股份有限公司 A kind of recognition methods of many fingerprints and device
CN106066956A (en) * 2016-05-27 2016-11-02 广东欧珀移动通信有限公司 A kind of user terminal screen unlocking method, device and user terminal
CN105872250A (en) * 2016-05-30 2016-08-17 努比亚技术有限公司 Method and device for automatically recognizing owner identity of mobile terminal
CN106126997A (en) * 2016-06-13 2016-11-16 深圳市九洲电器有限公司 A kind of terminal unit fingerprint recognition management method and system

Also Published As

Publication number Publication date
CN109325338A (en) 2019-02-12

Similar Documents

Publication Publication Date Title
CN108595946B (en) Privacy protection method and terminal
CN109933273B (en) Information processing method and terminal equipment
CN109241775B (en) Privacy protection method and terminal
CN108629171B (en) Unread message processing method and terminal
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN108256308B (en) Face recognition unlocking control method and mobile terminal
CN107861669B (en) Switching method of user system and mobile terminal
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN109993010B (en) Information display method and mobile terminal
CN108710806B (en) Terminal unlocking method and mobile terminal
CN109544172B (en) Display method and terminal equipment
CN108491713B (en) Safety reminding method and electronic equipment
CN111651105B (en) Parameter setting method and device and electronic equipment
CN109858447B (en) Information processing method and terminal
CN109446794B (en) Password input method and mobile terminal thereof
CN108600492B (en) Screen unlocking method and terminal
CN108109188B (en) Image processing method and mobile terminal
CN107895108B (en) Operation management method and mobile terminal
CN110096893B (en) Object limiting method and terminal equipment
CN109753776B (en) Information processing method and device and mobile terminal
CN109164951B (en) Mobile terminal operation method and mobile terminal
CN109547622B (en) Verification method and terminal equipment
CN111460537A (en) Method for hiding page content and electronic equipment
CN107491685B (en) Face recognition method and mobile terminal
CN108494754B (en) Account information processing method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant