CN110795713B - Fingerprint verification method and device - Google Patents
Fingerprint verification method and device Download PDFInfo
- Publication number
- CN110795713B CN110795713B CN201810869183.9A CN201810869183A CN110795713B CN 110795713 B CN110795713 B CN 110795713B CN 201810869183 A CN201810869183 A CN 201810869183A CN 110795713 B CN110795713 B CN 110795713B
- Authority
- CN
- China
- Prior art keywords
- imaging
- terminal
- fingerprint
- image
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/13—Sensors therefor
- G06V40/1318—Sensors therefor using electro-optical elements or layers, e.g. electroluminescent sensing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1335—Combining adjacent partial images (e.g. slices) to create a composite input or reference pattern; Tracking a sweeping finger movement
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the application provides a fingerprint verification method and a fingerprint verification device, relates to the technical field of communication, and aims to solve the problem that the recognition success rate of a fingerprint image formed by splicing imaging sub-blocks after a terminal is pasted with a film is low. The method is applied to a terminal, and the terminal is provided with a screen and a photosensitive device. The method comprises the following steps: the terminal detects fingerprint information input by a user through a screen, and the imaging sub-blocks are spliced to obtain a first fingerprint image used for verifying the identity of the user. When the first fingerprint image is verified, if the verification fails and at least two imaging subblocks with block effects exist in the imaging subblocks used for splicing the first fingerprint image, the terminal respectively adjusts the current splicing parameter of each imaging subblock in the imaging subblocks to be a target splicing parameter, and splices each imaging subblock according to the respective target splicing parameter of each imaging subblock to obtain a second fingerprint image. And when the second fingerprint image passes the verification, the terminal displays a first interface.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a fingerprint verification method and apparatus.
Background
At present, based on the security consideration of the terminal, a fingerprint identification technology can be adopted to distinguish a legal user from an illegal user. The fingerprint identification technology comprises a fingerprint identification technology under a screen, namely a fingerprint sensor is arranged below the screen of the terminal. In a fingerprint scheme under a screen based on the principle of pinhole imaging, as shown in fig. 1-1, a light guide plate 2 is disposed above the screen, when a finger presses a certain fingerprint collection area of the light guide plate 2 (for example, the radius of the fingerprint collection area is a1 in fig. 1-1), the terminal detects the fingerprint collection area and then lights up a light source 1 near the fingerprint collection area, at this time, the total reflection of light is destroyed due to the valley-ridge distribution of the fingerprint of the finger, so that a part of light in the light guide plate 2 is transmitted to the finger through the light guide plate 2 and reflected at the finger, and then the reflected light carries the fingerprint information of the finger to pass through a small aperture plate 4 and form an image on a photosensitive device 5. The small-hole plate 4 has a plurality of small holes, each of which images a portion of the fingerprint information collected by the fingerprint collection area above the small hole plate, so that each of the small holes contains a portion of the fingerprint information, and the image of each of the small holes is called an imaging sub-block. It can be seen that the imaging size of the pinhole image is related to both object distance d1 and image distance d2, as shown in fig. 1-1.
Therefore, the imaging sub-blocks corresponding to each small hole are collected on the photosensitive device 5, all the imaging sub-blocks are spliced to obtain a complete fingerprint image, the complete fingerprint image comprises complete fingerprint information of a user, and the identity of the user can be verified to be legal by using the fingerprint image.
However, in many application scenarios, the user attaches a protective film on the screen of the terminal, so that the object distance becomes d1 as shown in 1-2. It can be seen that the object distance is increased compared to the scene shown in fig. 1-1 when the film is not attached, which may cause the fingerprint information contained in the imaging sub-blocks with the same size to overlap, that is, the imaging sub-block 1 contains the fingerprint information 1, and the imaging sub-block 2 may also contain part of the fingerprint information (e.g., the shaded portion shown in fig. 1-2) of the fingerprint information 1, thereby stitching a fingerprint image with a larger error. When the user identity is verified using the high-error fingerprint image, the probability of successful fingerprint identification is reduced.
Disclosure of Invention
The embodiment of the application provides a fingerprint verification method and a terminal, which are used for solving the problem of low fingerprint identification rate.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, an embodiment of the present application provides a fingerprint verification method, where the method is applied to a terminal or a terminal chip, and the method includes: the terminal detects fingerprint information input by a user through a screen, and the imaging sub-blocks are spliced to obtain a first fingerprint image used for verifying the identity of the user. When the first fingerprint image is verified, if the verification fails and at least two imaging subblocks with a block effect exist in the imaging subblocks for splicing the first fingerprint image, the terminal respectively adjusts the current splicing parameter of each imaging subblock in the imaging subblocks to a target splicing parameter, and splices each imaging subblock according to the respective target splicing parameter of each imaging subblock to obtain a second fingerprint image. And when the second fingerprint image passes the verification, the terminal displays a first interface, and the first interface is associated with a terminal function of which the fingerprint information has the access right.
Wherein the fingerprint information is associated with a plurality of imaged sub-blocks formed on the photosensitive device, each imaged sub-block containing at least part of the fingerprint information; the blocking effect is used for representing that the overlapping degree of fingerprint information contained in each of the two imaging sub-blocks is larger than or equal to a threshold value, and the splicing parameter is used for representing the size of the imaging sub-blocks.
According to the fingerprint verification method provided by the embodiment of the application, after a user inputs fingerprint information through a terminal screen, if a first fingerprint image formed by splicing a plurality of imaging sub-blocks associated with the fingerprint information cannot pass verification, the terminal executes a process of adjusting the splicing parameters of the imaging sub-blocks, and splices the plurality of imaging sub-blocks after the splicing parameters are adjusted to form a second fingerprint image. Furthermore, the terminal uses the second fingerprint image to verify the identity of the user, and when the second fingerprint image passes the verification, the terminal can provide a corresponding display interface for the user, namely, the terminal provides a corresponding terminal function for the user after the second fingerprint image passes the verification. After the splicing parameters are adjusted, the sizes of the imaging sub-blocks are changed, so that the blocking effect degree among the imaging sub-blocks is correspondingly changed, and the blocking effect among the imaging sub-blocks is reduced. Therefore, the definition and the accuracy of the second fingerprint image formed by splicing the imaging sub-blocks can be high, and the success rate of fingerprint identification is improved.
In one possible design, the terminal adjusts the current stitching parameter of each of the plurality of imaging sub-blocks to a target stitching parameter, and the method specifically includes the following steps:
the terminal displays a preset image on a screen, acquires a second image of the preset image on the photosensitive device, and respectively adjusts the current splicing parameter of each imaging sub-block in the plurality of images to be a target splicing parameter according to the first image and the second image.
Under the condition that the terminal is not pasted with the film initially, imaging of the preset image on the photosensitive device is a first image; the second image is a new image of the preset image on the photosensitive device.
Optionally, the target stitching parameter is related to a ratio of the first image size and the second image size.
In a possible design, the terminal respectively adjusts the current stitching parameter of each of the plurality of imaging sub-blocks to a target stitching parameter, and may specifically implement the following steps:
the terminal gradually reduces the size of each imaging subblock according to a preset step length, judges whether at least two imaging subblocks with block effect exist in the plurality of imaging subblocks after the size of the imaging subblock is reduced each time until no block effect exists between any two imaging subblocks, and respectively uses the splicing parameters of each imaging subblock when no block effect exists as the respective target splicing parameters of each imaging subblock.
In one possible design, after the terminal verifies the first fingerprint image and fails to verify the first fingerprint image, the following steps may be further performed: and if the blocking effect does not exist between every two imaging sub-blocks in the first fingerprint image, the terminal displays a second interface for prompting the user to re-enter the fingerprint information.
In a second aspect, an embodiment of the present application provides a terminal, which includes a detection unit, a splicing unit, an adjustment unit, and a display unit. The detection unit is used for detecting fingerprint information input by a user through a screen, the fingerprint information is associated with a plurality of imaging sub-blocks formed on the photosensitive device, and each imaging sub-block comprises at least partial fingerprint information; the splicing unit is used for splicing the imaging sub-blocks to obtain a first fingerprint image used for verifying the identity of a user; the adjusting unit is used for adjusting the current splicing parameter of each imaging subblock in the plurality of imaging subblocks to a target splicing parameter when the first fingerprint image is verified and if the verification fails and at least two imaging subblocks with block effect exist in the plurality of imaging subblocks for splicing the first fingerprint image; the splicing unit is further configured to splice each imaging subblock according to a target splicing parameter of each imaging subblock obtained by the adjusting unit to obtain a second fingerprint image, where the blocking effect is used to represent that the overlapping degree of fingerprint information included in each of the two imaging subblocks is greater than or equal to a threshold, and the splicing parameter is used to represent the size of the imaging subblock; and the display unit is used for displaying a first interface when the second fingerprint image passes verification, and the first interface is associated with a terminal function of which the fingerprint information has access authority.
In one possible design, the adjusting unit is configured to adjust the current stitching parameter of each of the plurality of imaging sub-blocks to a target stitching parameter, respectively, and includes: the terminal is used for displaying a preset image on a screen, wherein in the case that the terminal is not pasted with a film at the beginning, the preset image is imaged on the photosensitive device to form a first image; acquiring a second image of the preset image on the photosensitive device, wherein the second image is a new image of the preset image on the photosensitive device; and respectively adjusting the current splicing parameter of each imaging sub-block in the plurality of images to be a target splicing parameter according to the first image and the second image.
Optionally, the target stitching parameter is related to a ratio of the first image size and the second image size.
In one possible design, the adjusting unit is configured to adjust the current stitching parameter of each of the plurality of imaging sub-blocks to a target stitching parameter, respectively, and includes: the imaging sub-blocks are used for reducing the size of each imaging sub-block gradually according to a preset step length, and judging whether at least two imaging sub-blocks with block effect exist in the plurality of imaging sub-blocks after the size of the imaging sub-blocks is reduced each time until the block effect does not exist between any two imaging sub-blocks; and respectively taking the splicing parameters of each imaging sub-block when the blocking effect does not exist as the respective target splicing parameters of each imaging sub-block.
In a possible design, the display unit is further configured to display a second interface for prompting a user to re-enter fingerprint information if no blocking effect exists between every two imaged sub-blocks in the first fingerprint image.
In a possible design of the first aspect or the second aspect, a film is pasted on a screen of the terminal in a case where the terminal verifies the first fingerprint image, the verification fails and there are at least two imaged sub-blocks having a blocking effect among a plurality of imaged sub-blocks used for stitching the first fingerprint image.
In one possible design of the first aspect or the second aspect, the degree of overlap of the fingerprint information contained in each of the two imaged sub-blocks is positively correlated to the thickness of the applied film.
In one possible design of the first or second aspect, the predetermined step size is related to the terminal film thickness.
In a third aspect, embodiments of the present application provide a terminal including one or more processors and one or more memories. The one or more memories are coupled to the one or more processors and the one or more memories are configured to store computer program code comprising computer instructions that, when executed by the one or more processors, cause the terminal to perform the fingerprint authentication method of any one of the possible implementations of the above aspects.
In a fourth aspect, an embodiment of the present application provides a computer storage medium, which includes computer instructions, and when the computer instructions are executed on a terminal, the terminal executes a fingerprint verification method in any one of the possible implementation manners of the foregoing aspects.
In a fifth aspect, the present application provides a computer program product, which when run on a computer, causes the computer to execute the fingerprint verification method in any one of the possible implementations of any one of the above aspects.
In a sixth aspect, there is provided circuitry comprising processing circuitry configured to enable a terminal to implement the functionality referred to in the first aspect above.
For technical effects brought by any one of the design manners in the second aspect to the sixth aspect, reference may be made to technical effects brought by different design manners in the first aspect, and details are not described here.
Drawings
FIG. 1-1 is a schematic diagram of a conventional fingerprint authentication principle;
FIGS. 1-2 are schematic diagrams of conventional fingerprint authentication principles;
fig. 1-3 are schematic diagrams illustrating adjustment of imaging sub-block stitching parameters according to embodiments of the present disclosure;
fig. 1-4 are schematic diagrams illustrating adjustment of imaging sub-block stitching parameters according to embodiments of the present disclosure;
fig. 2 is a schematic structural diagram of a terminal according to an embodiment of the present application;
FIG. 3 is a flowchart of a fingerprint verification method provided in an embodiment of the present application;
FIG. 4-1 is a schematic diagram of an imaging sub-block provided by an embodiment of the present application;
4-2 is a schematic diagram of adjusting an imaging sub-block according to an embodiment of the present application;
FIG. 5-1 is a schematic diagram of an imaging sub-block provided by an embodiment of the present application;
FIG. 5-2 is a schematic diagram of an imaging sub-block provided by an embodiment of the present application;
fig. 6 is a schematic diagram of a terminal interface provided in an embodiment of the present application;
FIG. 7-1 is a schematic diagram of a sub-block scoring scheme provided in an embodiment of the present application;
FIG. 7-2 is a schematic diagram of a sub-block scoring method provided in an embodiment of the present application;
FIG. 8 is a schematic diagram illustrating a principle of sub-block scoring according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Where in the description of the present application, "/" indicates an OR meaning, for example, A/B may indicate A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the present application, "a plurality" means two or more than two. Meanwhile, in order to facilitate clear description of technical solutions of the embodiments of the present application, in the embodiments of the present application, terms such as "first" and "second" are used to distinguish the same items or similar items having substantially the same functions and actions, and those skilled in the art can understand that terms such as "first" and "second" do not limit the number and execution order. For example, the "first" of the first terminal and the "second" of the second terminal in the embodiment of the present application are only used to distinguish different network devices.
The service scenario described in the embodiment of the present application is for more clearly illustrating the technical solution of the embodiment of the present application, and does not form a limitation on the technical solution provided in the embodiment of the present application, and it can be known by a person skilled in the art that with the occurrence of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
The fingerprint verification method provided by the embodiment of the application is applied to any terminal with a fingerprint identification function, such as electronic equipment such as a mobile phone, a tablet, a notebook and the like. The embodiment will be specifically described below by taking the mobile phone 100 as an example. It should be understood that the handset 100 shown in fig. 2 is only one example of a terminal, and that the handset 100 may have more or fewer components than shown, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
As shown in fig. 2, the mobile phone 100 may specifically include: one or more processors 101, Radio Frequency (RF) circuitry 102, memory 103, touch screen 104, bluetooth device 105, one or more sensors 106, wifi device 107, positioning device 108, audio circuitry 109, peripheral interface 110, and power system 111. These components may communicate over one or more communication buses or signal lines (not shown in fig. 2).
The following describes the components of the handset 100 in detail with reference to fig. 2:
the processor 101 is a control center of the cellular phone 100, connects various parts of the cellular phone 100 by various interfaces and lines, and performs various functions of the cellular phone 100 and processes data by running or executing an application program stored in the memory 103 and calling data and instructions stored in the memory 103. In some embodiments, processor 101 may include one or more processing units; processor 101 may also integrate an application processor and a modem processor; the application processor mainly processes an operating system, a user interface, application programs and the like, and the modem processor mainly processes wireless communication. It will be appreciated that the modem processor described above may not be integrated into the processor 101. For example, the processor 101 may be an kylin 960 chip manufactured by Huanti technologies, Inc. In some embodiments of the present application, the processor 101 may further include a fingerprint verification chip for verifying the acquired fingerprint.
In some other embodiments of the present application, the processor 101 may further include an AI chip. The learning and processing capabilities of the AI chip include image understanding capabilities, natural language understanding capabilities, voice recognition capabilities, and the like. The AI chip may enable the handset 100 to have better performance, longer endurance, and better security and privacy. For example, if the mobile phone 100 processes data through the cloud, the result is returned after the data is uploaded, which is very inefficient under the prior art. If the local end of the mobile phone 100 has a strong AI learning capability, the mobile phone 100 does not need to upload data to the cloud and directly processes the data at the local end, so that the processing efficiency can be improved and the security and privacy of the data can be improved.
The rf circuit 102 may be used for receiving and transmitting wireless signals during the transmission and reception of information or calls. Specifically, the rf circuit 102 may receive downlink data of the base station and then process the received downlink data to the processor 101; in addition, data relating to uplink is transmitted to the base station. Typically, the radio frequency circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency circuitry 102 may also communicate with other devices via wireless communication. The wireless communication may use any communication standard or protocol including, but not limited to, global system for mobile communications, general packet radio service, code division multiple access, wideband code division multiple access, long term evolution, email, short message service, etc.
The memory 103 is used for storing application programs and data, and the processor 101 executes various functions and data processing of the mobile phone 100 by running the application programs and data stored in the memory 103. The memory 103 mainly includes a program storage area and a data storage area, wherein the program storage area can store an operating system and application programs (such as a sound playing function and an image playing function) required by at least one function; the storage data area may store data (e.g., audio data, a phonebook, etc.) created from use of the handset 100. Further, the memory 103 may include a high speed random access memory, and may also include a non-volatile memory, such as a magnetic disk storage device, a flash memory device, or other non-volatile solid state storage device. The memory 103 may store various operating systems, such as those developed by apple IncOperating System, developed by GoogleAn operating system, etc. Examples of the inventionThe memory 103 stores therein application programs related to embodiments of the present application, such as application programs WeChat, Paibao, and the like related to a fingerprint authentication function, and the memory 103 also stores therein information that may be related to fingerprint authentication of embodiments of the present application, such as fingerprint information, image sub-block information, and the like.
The touch screen 104 may include a touch sensitive surface 104-1 and a display 104-2. Among other things, the touch-sensitive surface 104-1 (e.g., a touch panel) may capture touch events on or near the touch-sensitive surface 104-1 by a user of the cell phone 100 (e.g., user operation on or near the touch-sensitive surface 104-1 using a finger, a stylus, or any other suitable object) and transmit the captured touch information to other devices, such as the processor 101. Among other things, a touch event of a user near the touch-sensitive surface 104-1 may be referred to as a hover touch; hover touch may refer to a user not needing to directly touch the touch pad in order to select, move, or drag a target (e.g., an application icon, etc.), but only needing to be located near the cell phone 100 in order to perform a desired function. In the context of a hover touch application, the terms "touch," "contact," and the like do not imply a contact that is used to directly contact the touch screen 104, but rather a contact that is near or in proximity thereto. The touch-sensitive surface 104-1 capable of floating touch control can be implemented by using capacitance, infrared light sensation, ultrasonic waves and the like. The touch-sensitive surface 104-1 may include two portions, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 101, and the touch controller can also receive and execute instructions sent by the processor 101. Additionally, the touch-sensitive surface 104-1 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. Display (also referred to as a display screen) 104-2 may be used to display information entered by or provided to the user as well as various menus for handset 100. The display 104-2 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The touch-sensitive surface 104-1 may overlay the display 104-2, and when a touch event is detected on or near the touch-sensitive surface 104-1, it may be communicated to the processor 101 to determine the type of touch event, and the processor 101 may then provide a corresponding visual output on the display 104-2 based on the type of touch event. Although in FIG. 2 the touch-sensitive surface 104-1 and the display screen 104-2 are shown as two separate components to implement the input and output functions of the cell phone 100, in some embodiments the touch-sensitive surface 104-1 and the display screen 104-2 may be integrated to implement the input and output functions of the cell phone 100. It is understood that the touch screen 104 is formed by stacking multiple layers of materials, only the touch-sensitive surface (layer) and the display screen (layer) are shown in the embodiment of the present application, and the description of the other layers is omitted in the embodiment of the present application. In addition, in some other embodiments of the present application, the touch-sensitive surface 104-1 may be overlaid on the display 104-2, and the size of the touch-sensitive surface 104-1 is larger than that of the display screen 104-2, so that the display screen 104-2 is completely overlaid on the touch-sensitive surface 104-1, or the touch-sensitive surface 104-1 may be disposed on the front of the mobile phone 100 in a full-panel manner, that is, the user's touch on the front of the mobile phone 100 can be sensed by the mobile phone, so that the full-touch experience on the front of the mobile phone can be achieved. In other embodiments, the touch-sensitive surface 104-1 may be disposed on the front of the mobile phone 100 in a full-panel manner, and the display screen 104-2 may also be disposed on the front of the mobile phone 100 in a full-panel manner, so that a frameless structure can be implemented on the front of the mobile phone. In some other embodiments of the present application, the touch screen 104 may further include a series of pressure sensor arrays that may enable the cell phone to sense the pressure applied to the touch screen 104 by the touch event.
The handset 100 may also include a bluetooth device 105 for enabling data exchange between the handset 100 and other short-range electronic devices (e.g., cell phones, smartwatches, etc.). The bluetooth device in the embodiment of the present application may be an integrated circuit or a bluetooth chip.
The handset 100 may also include at least one sensor 106, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display of the touch screen 104 according to the brightness of ambient light, and a proximity sensor that turns off the power of the display when the mobile phone 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, tapping), and the like.
In some embodiments of the present application, the sensor 106 may also include a fingerprint sensor. For example, the fingerprint sensor may be disposed on the back side of the handset 100 (e.g., below the rear camera), or on the front side of the handset 100 (e.g., below the touch screen 104). In addition, the fingerprint recognition function can also be realized by configuring a fingerprint sensor in the touch screen 104, that is, the fingerprint sensor can be integrated with the touch screen 104 to realize the fingerprint recognition function of the mobile phone 100. In this case, the fingerprint sensor may be disposed in the touch screen 104, may be a part of the touch screen 104, or may be otherwise disposed in the touch screen 104. Additionally, the fingerprint sensor may be implemented as a full panel fingerprint sensor, and thus, the touch screen 104 may be considered a panel that may be used for fingerprint acquisition at any location. The fingerprint sensor may send the captured fingerprint to the processor 101 for processing (e.g., fingerprint verification, etc.) of the fingerprint by the processor 101. The fingerprint sensor in embodiments of the present application may employ any type of sensing technology including, but not limited to, optical, capacitive, piezoelectric, or ultrasonic sensing technologies, among others.
In addition, as for the mobile phone 100, other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor may be further configured, which are not described herein.
The wifi device 107 is used for providing network access for the mobile phone 100 according to wifi related standard protocols, the mobile phone 100 can be accessed to a wifi access point through the wifi device 107, and therefore the mobile phone helps a user to send and receive e-mails, browse webpages, access streaming media and the like, and wireless broadband internet access is provided for the user. In some other embodiments, the wifi device 107 may also be a wifi wireless access point, which may provide wifi network access to other electronic devices.
And a positioning device 108 for providing a geographical position for the handset 100. It can be understood that the positioning device 108 may specifically be a receiver of a positioning system such as a Global Positioning System (GPS), a beidou satellite navigation system, and the like. After receiving the geographic location sent by the positioning system, the positioning device 108 sends the information to the processor 101 for processing or sends the information to the memory 103 for storage. In some other embodiments, the positioning device 108 may be an Assisted Global Positioning System (AGPS) receiver, where the AGPS is an operation mode for performing GPS positioning with mobile assistance, and it can utilize signals of base stations to coordinate with GPS satellite signals, so as to make the positioning speed of the mobile phone 100 faster; in AGPS systems, the positioning device 108 may obtain positioning assistance through communication with an assisted positioning server (e.g., the positioning server of the handset 100). The AGPS system assists the positioning device 108 in performing ranging and positioning services by acting as an assisted positioning server, which in this case provides positioning assistance by communicating with the positioning device 108 (i.e., GPS receiver) of the handset 100 over a wireless communication network. In other embodiments, the location device 108 may also be a wifi access point based location technology. Since each wifi access point has a globally unique MAC address, the mobile phone 100 can scan and collect broadcast signals of surrounding wifi access points when the wifi is turned on, so that the MAC address broadcasted by the wifi access point can be acquired; the mobile phone 100 sends the data (such as the MAC address) capable of indicating the wifi access point to the location server through the wireless communication network, the location server retrieves the geographical location of each wifi access point, and calculates the geographical location of the mobile phone 100 and sends the geographical location of the mobile phone 100 to the positioning device 108 of the mobile phone 100 according to the strength of the wifi broadcast signal.
The audio circuitry 109, speaker 112, microphone 113 may provide an audio interface between a user and the handset 100. The audio circuit 109 may transmit the electrical signal converted from the received audio data to the speaker 112, and convert the electrical signal into a sound signal for output by the speaker 112; on the other hand, the microphone 113 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 109, and outputs the audio data to the RF circuit 102 to be transmitted to, for example, a cellular phone, or outputs the audio data to the memory 103 for further processing.
It is understood that the mobile phone 100 may further include a power system 111 (such as a battery and a power management chip) for supplying power to each component, and the battery may be logically connected to the processor 101 through the power management chip, so as to implement functions of managing charging, discharging, and power consumption through the power system 111.
Although not shown in fig. 2, the mobile phone 100 may further include a camera, such as a front-facing camera and a rear-facing camera, wherein the front-facing camera may be used for capturing face feature information, and the processor 101 may perform face recognition on the face feature information for subsequent processing. The mobile phone 100 may further include a flash, a micro-projector, a Near Field Communication (NFC) device, and the like, which are not described in detail herein.
The following embodiments may be implemented in a terminal having the above-described hardware configuration. The following embodiment will describe the fingerprint authentication method provided in the embodiment of the present application, taking a terminal as a mobile phone 100 as an example.
As shown in fig. 3, the fingerprint verification method provided in the embodiment of the present application includes the following steps:
s301, the terminal detects fingerprint information input by a user through a screen.
Alternatively, as shown in fig. 2, when an application processor is integrated in the processor 101, the application processor calls data or instructions stored in the memory 103 to execute S301.
Assuming that the terminal has the fingerprint collection structure as shown in fig. 1-1, when a user presses a fingerprint collection area on the light guide plate 2, the terminal detects the user's pressing on the fingerprint collection area, and lights the light source 1 in the fingerprint collection area near the finger, wherein a part of light emitted from the light source 1 propagates in the light guide plate 2 by total reflection, and a part of light propagates through the light guide plate 2 to the finger, and thus the part of light propagating to the finger can carry fingerprint information of the user. Then, the light carrying the fingerprint information can pass through the light guide plate 2, the screen 6 and the aperture plate 4, and forms an image on the photosensitive device 5 below the aperture plate 4 based on the aperture imaging principle. Wherein each imaged sub-block is referred to herein as an imaged sub-block, each imaged sub-block comprising at least part of the fingerprint information, i.e. the complete fingerprint information of the user, is associated with a plurality of imaged sub-blocks formed on the photosensitive device.
For example, as shown in fig. 1-1, the imaging sub-block 1 includes fingerprint information collected by the terminal in the fingerprint collection area 1, i.e., fingerprint information collected in the fingerprint collection area covering the range a1, the imaging sub-block 2 includes fingerprint information collected by the terminal in the fingerprint collection area 2, i.e., fingerprint information collected in the fingerprint collection area covering the range a2, the imaging sub-block 3 includes fingerprint information collected by the terminal in the fingerprint collection area 3, i.e., fingerprint information collected in the fingerprint collection area covering the range a3, and the imaging sub-block 4 includes fingerprint information collected by the terminal in the fingerprint collection area 4, i.e., fingerprint information collected in the fingerprint collection area covering the range a 4. Of course, in fig. 1-1, only 4 fingerprint capturing areas and 4 imaging sub-blocks are used as examples, and the number of the fingerprint capturing areas and the imaging sub-blocks in an actual fingerprint verification scene may be set separately, which is not limited in the embodiments of the present application.
It should be noted that the shape of the imaging sub-block is related to the shape of the aperture on the aperture plate, and optionally, when the aperture is circular, the imaging sub-block may be circular or may have other shapes due to the influence of the depth of the aperture and the refractive index of the medium on both sides of the aperture, which is not limited in this embodiment. As described below, the imaging sub-block is taken as a circle for example, and for convenience of analyzing and processing the imaging sub-block, a square area may be cut from the circular imaging sub-block to serve as a processing unit. Referring to fig. 4-1, a schematic top view of an imaged sub-block is taken. It can be seen that the complete user fingerprint information is associated with 9 imaged sub-blocks. Each imaged sub-block is a square sub-block, each square sub-block containing a portion of fingerprint information.
S302, the terminal splices the imaging sub-blocks to obtain a first fingerprint image used for verifying the identity of the user.
Alternatively, as shown in fig. 2, when an application processor is integrated in the processor 101, the application processor calls data or instructions stored in the memory 103 to execute S302.
For example, fig. 4-1 shows the fingerprint information included in each imaging sub-block from the top view, extracts the fingerprint information included in 9 imaging sub-blocks, and concatenates the fingerprint information to form a complete user fingerprint image, i.e., a first fingerprint image, where the first fingerprint image may be used to verify the identity of the user.
For another example, fig. 1-2 shows the relationship between the fingerprint collection area, the partial fingerprint information, and the imaging sub-blocks from a side view. The complete fingerprint image (i.e. the first fingerprint image) of the user can be obtained by splicing the imaging sub-blocks 1, 2, 3 and 4.
S303, the terminal verifies the spliced first fingerprint image.
Alternatively, as shown in fig. 2, when an application processor is integrated in the processor 101, the application processor calls data or instructions stored in the memory 103 to execute S303.
S304, the terminal judges whether the first fingerprint image passes the verification, if not, S305 is executed, and if so, S309 is executed.
Alternatively, as shown in fig. 2, when an application processor is integrated in the processor 101, the application processor calls data or instructions stored in the memory 103 to execute S304.
S305, the terminal judges whether at least two imaging subblocks with the block effect exist in the plurality of imaging subblocks for splicing the first fingerprint image, if so, S306 is executed, and if not, S308 is executed.
Alternatively, as shown in fig. 2, when an application processor is integrated in the processor 101, the application processor calls data or instructions stored in the memory 103 to execute S305.
As shown in fig. 1-1, the fingerprint information collected in the fingerprint collection area 1 (coverage radius a1) corresponds to the imaging sub-block 1 on the photosensitive device, and the fingerprint information collected in the fingerprint collection area 2 (coverage radius a2) corresponds to the imaging sub-block 2 on the photosensitive device. As one implementation, the degree of overlap of the fingerprint information contained in the imaged sub-blocks 1 and 2 depends on the object distance and the image distance. Referring to fig. 1-1 and 1-2, increasing the object distance without changing the image distance (i.e. the distance between the aperture plate and the photosensitive device) results in the overlap of the fingerprint information contained in the imaged sub-blocks 1 and 2, and the larger the object distance, the more significant the fingerprint information overlap. Also, the object distance is generally affected by the thickness of the patch. Therefore, the overlapping degree of the fingerprint information contained in each of the two imaging sub-blocks is related to the thickness of the attached film, and the thicker the attached film is, the more the object distance is increased, the larger the overlapping degree of the fingerprint information contained in the two imaging sub-blocks is, the thinner the attached film is, the smaller the overlapping degree of the fingerprint information contained in the two imaging sub-blocks is, that is, the overlapping degree of the fingerprint information contained in each of the two imaging sub-blocks is positively related to the thickness of the attached film.
In the embodiment of the present application, the blocking artifacts are used to characterize that the degree of overlap of the fingerprint information contained in each of the two imaged sub-blocks is greater than or equal to a threshold value. For example, referring to fig. 1-2, fingerprint information contained in the imaging sub-block 1 and the imaging sub-block 2 overlap, that is, the imaging sub-block 1 and the imaging sub-block 2 both contain fingerprint information collected in the overlapping area of the light guide plate, and when the overlapping area is large enough, a blocking effect exists between the imaging sub-block 1 and the imaging sub-block 2. With reference to the above description, it can be concluded that the degree of blocking effect is also related to the patch thickness. When the film is thicker, the blocking effect is more remarkable, and the film is thinner, the blocking effect degree is shallower.
As described above, when there is a blocking effect between the two imaged sub-blocks, i.e. when the two imaged sub-blocks contain a deep overlap of fingerprint information, this reflects a large increase in the imaged object distance as shown in fig. 1-2, in which case it can be considered that the terminal is filmed. Therefore, the terminal can know whether the terminal is filmed or not by performing S305, without the user determining whether the terminal is filmed or not.
S306, the terminal respectively adjusts the current splicing parameter of each imaging sub-block in the plurality of imaging sub-blocks to be a target splicing parameter, and splices each imaging sub-block according to the respective target splicing parameter of each imaging sub-block to obtain a second fingerprint image.
Alternatively, as shown in fig. 2, when an application processor is integrated in the processor 101, the application processor calls data or instructions stored in the memory 103 to execute S306.
And the splicing parameters are used for representing the sizes of the imaging sub-blocks.
In combination with the above, when the blocking effect exists between at least two of the plurality of imaged sub-blocks used for stitching the first fingerprint image, the terminal knows that the film is pasted on the screen. Furthermore, in order to avoid the problem that the success rate of identification of the obtained fingerprint image is reduced due to the fact that the film-attached terminal splices the imaging sub-blocks with overlapped contents, the terminal respectively adjusts the current size of each imaging sub-block to be the target size, and therefore the blocking effect does not exist between every two imaging sub-blocks after adjustment. And then, the terminal splices the imaging sub-blocks with the target size to form a second fingerprint image, and the second fingerprint image can be used for subsequent user identity authentication.
In the embodiment of the present application, adjusting the stitching parameter of the imaging sub-blocks (i.e., the size of the imaging sub-blocks) may be performed in any one of the following two ways:
splicing parameter adjustment mode 1: the terminal reduces the size of each imaging sub-block gradually according to a preset step length, and judges whether at least two imaging sub-blocks with block effect exist in the plurality of imaging sub-blocks after the size of the imaging sub-blocks is reduced each time until the block effect does not exist between any two imaging sub-blocks. And the terminal respectively takes the splicing parameters of each imaging sub-block as the respective target splicing parameters of each imaging sub-block when the block effect does not exist.
The preset step length can be set in at least two setting modes as follows:
preset step setting mode 1: and dynamically setting a preset step length. After the terminal acquires the overlapping degree of the fingerprint information contained in the two imaging sub-blocks, when the overlapping degree is within a first numerical range, a first preset step length is set, and when the overlapping degree is within a second numerical range, a second preset step length is set. Typically, the first range of values is different from the second range of values, and the first predetermined step size is different from the second predetermined step size. Optionally, when the overlapping degree is larger, the preset step length is also set to a larger value, so as to quickly adjust the imaging sub-block from the current size to the target size. When the overlapping degree is smaller, the preset step length is set with a smaller numerical value, so that the adjustment precision is improved to some extent.
Preset step setting mode 2: the preset step length is a fixed value and can be set by a user, or the default preset step length value is stored in the terminal. For example, the preset step size is N pixels, where N is a positive integer (e.g., 1).
Of course, the preset step length may also be set in other manners, which is not limited in this application.
If the preset step length adopts a fixed value, for example, the preset step length is taken as one pixel, referring to fig. 5-1 and 5-2, a method 1 for adjusting the splicing parameters is given from a top view: after the terminal detects that the imaging subblocks with the block effect exist in the first fingerprint image formed by splicing the 9 imaging subblocks shown in the figure 4-1, the terminal executes a process of adjusting the splicing parameters of the imaging subblocks for the first time, namely the terminal respectively reduces the sizes of the 9 imaging subblocks by 1 pixel. As one possible implementation, referring to fig. 5-1 and 5-2, downscaling the imaged sub-block by 1 pixel means that the upper and lower sides of the imaged sub-block are each reduced by one row of pixels and the left and right sides of the imaged sub-block are each reduced by one column of pixels (as shown in fig. 5-2, the reduced pixels are shown filled in black).
After the size of each imaging sub-block is reduced for the first time, the size of the imaging sub-block is as shown in fig. 4-2, for convenience, only the adjusted size (i.e., the size circled by the square box) of the 5 th imaging sub-block from top to bottom and from left to right is shown in fig. 4-2, and the adjusted sizes of the other 8 imaging sub-blocks can be referred to the adjusted size of the 5 th imaging sub-block. And then, the terminal judges whether at least two imaging subblocks with the block effect exist in the adjusted 9 imaging subblocks, if at least two imaging subblocks with the block effect still exist, the terminal executes a process of adjusting the splicing parameters of the imaging subblocks for the second time, and reduces the sizes of the 9 imaging subblocks according to the preset step length of 1 pixel, so that the overlapped fingerprint information in the imaging subblocks is removed equivalently, and whether at least two imaging subblocks with the block effect still exist in the 9 imaging subblocks after the size is adjusted for the second time is judged. Until the splicing parameters are adjusted for a certain time, no blocking effect exists between any two imaging subblocks in the 9 imaging subblocks, which indicates that the overlapping degree of fingerprint information contained in any two imaging subblocks in the 9 imaging subblocks is small, at this time, the terminal takes the splicing parameters of each imaging subblock when no blocking effect exists as respective target splicing parameters of each imaging subblock, that is, the terminal takes the size of each imaging subblock when no blocking effect exists as respective target size. For example, the terminal gradually reduces the size of each imaging sub-block according to the preset step of 1 pixel, after the terminal executes the flow of reducing the size of the imaging sub-block for the fifth time, the terminal finds that no block effect exists between any two imaging sub-blocks after the size of the imaging sub-block is reduced for the current time, and then the terminal takes the size of each imaging sub-block as the respective target size, takes each imaging sub-block with the size adjusted for the fifth time as the basis of the spliced fingerprint image, extracts the fingerprint information contained in each imaging sub-block with the target size, and splices each extracted fingerprint information into the second fingerprint image.
For better understanding, fig. 1-2, 1-3, and 1-4 show a manner 1 of adjusting the stitching parameters from a side view. As shown in fig. 1-2, after the terminal receives fingerprint information input by a user by pressing the light guide plate 2, there is a blocking effect between the 4 imaged sub-blocks captured by the terminal on the photosensitive device. Then, as shown in fig. 1-3, the terminal executes the procedure of adjusting the size of the imaging sub-block for the first time, and reduces the sizes of the imaging sub-block 1, the imaging sub-block 2, the imaging sub-block 3, and the imaging sub-block 4, respectively, and in this size adjustment, certain overlapped fingerprint information still exists between the imaging sub-blocks. Therefore, as shown in fig. 1 to 4, the terminal continues to perform the process of adjusting the size of the imaging sub-blocks for the second time, and the sizes of the 4 imaging sub-blocks are respectively reduced, and in this size adjustment, there is no overlapped fingerprint information between the imaging sub-blocks, so far, the terminal can splice the 4 imaging sub-blocks to form a second fingerprint image, and verify the user identity by using the newly obtained second fingerprint image.
In fig. 1-2, 1-3, and 1-4, the terminal performs twice resizing of the imaging sub-blocks to achieve the result that no blocking effect exists between the imaging sub-blocks, and it can be understood that, in practical applications, the number of times of resizing of the terminal is affected by factors such as the thickness of the film, which is not limited to two times, but may be other times, which is not limited in the embodiment of the present application.
In addition, the target sizes of different imaging sub-blocks may be different. For example, if the degree of overlap between two imaged sub-blocks is significant, the target size of the imaged sub-block is small, so as to ensure that the imaged sub-block of the target size does not contain invalid fingerprint information or overlapped fingerprint information. Correspondingly, if the degree of overlap of the two imaged sub-blocks is small, the target size of the imaged sub-blocks will be large, and if there is no overlap between the two imaged sub-blocks, the size of the imaged sub-blocks may not be adjusted.
Splicing parameter adjustment mode 2: the terminal stores a preset image, and light emitted by the preset image is reflected on the adhesive film, passes through the light guide plate 2, the screen 6 and the small hole plate 4 and forms an image on the photosensitive device 5. The imaging size of the preset image on the photosensitive device when the film is not attached is measured before the factory shipment and stored in the terminal. And the actual imaging size of the preset image on the photosensitive device after film pasting can be measured by the terminal in the subsequent use process. The preset image may be a circle, a square, or other figures, which is not limited in this embodiment of the application.
Subsequently, when a user inputs fingerprint information through a terminal screen, the terminal splices the imaging sub-blocks associated with the fingerprint information to form a first fingerprint image, and verifies the first fingerprint image. If the verification fails and the terminal finds that at least two imaging sub-blocks with block effect exist in the plurality of imaging sub-blocks associated with the first fingerprint image according to the method, namely a film is pasted on a terminal screen, the terminal displays a preset image on the screen and obtains a new imaging of the preset image on the photosensitive device during film pasting, namely a second image. And then, the terminal respectively adjusts the current splicing parameter of each imaging sub-block in the plurality of images into a target splicing parameter according to the first image and the second image.
Specifically, the target stitching parameter is related to a ratio of the first image size to the second image size. It can be understood that, as the object distance increases after the film is attached, the image size of the same preset image on the photosensitive device becomes smaller, the reduced portion of the second image relative to the first image contains invalid information, and the size difference between the first image and the second image is related to the thickness of the film. Therefore, the size of the first image and the size of the second image can be divided to obtain a size proportion, and each imaging sub-block is reduced by a certain size from the current size according to the size proportion to obtain the target size of each imaging sub-block.
For example, in a specific application scenario, when the terminal is not pasted with a film, the preset image is imaged on the photosensitive device, that is, the first image is a square with a side length of L1(L1 pixels), and fingerprint information is entered, and the fingerprint information is used for verifying the identity of the user. Then, a user pastes a film on the terminal in the process of using the terminal and tries to unlock the terminal screen through the fingerprint verification function, however, the film causes the block effect among a plurality of imaging sub-blocks related to currently-entered fingerprint information, and the fingerprint is not verified. At this time, the terminal displays a preset image on the screen and captures an image of the preset image on the photosensitive device, i.e., a second image, which is a square with a side length of L2, and the value of L2 is L1-3. The ratio of the size of the second image to the first image is (L1-3)/L1. Then, the imaged sub-block where the blocking effect exists is scaled down by the ratio of (L1-3)/L1. Thus, the imaging sub-block with the adjusted size is obtained. The terminal can splice the imaging sub-blocks after the size adjustment to form a second fingerprint image.
And S307, the terminal judges whether the second fingerprint image passes the verification, if so, the terminal executes S309, and if not, the terminal executes S308.
Alternatively, as shown in fig. 2, when an application processor is integrated in the processor 101, the application processor calls data or instructions stored in the memory 103 to execute S307.
And S308, displaying a second interface by the terminal.
Alternatively, as shown in fig. 2, when the processor 101 is integrated with an application processor, the application processor calls data or instructions stored in the memory 103 to control the terminal screen to display the second interface.
It can be understood that when the first fingerprint image fails to be verified and no blocking effect exists between every two imaging sub-blocks in the first fingerprint image, it is indicated that the terminal is not pasted with the film, and at this time, optionally, the terminal displays a second interface on the screen for prompting the user to re-enter the fingerprint information. For example, referring to fig. 6, when the terminal is not filmed and the first fingerprint image is not verified, the terminal displays "there is an error in fingerprint entry, please adjust the gesture, and re-enter the fingerprint" to prompt the user to adjust the pressing pressure, the pressing area, and the like.
Optionally, when the first fingerprint image fails to be verified, the terminal may further prompt the user that the fingerprint verification fails in a manner of vibration or the like. When the terminal is not pasted with a film and the first fingerprint image is not verified, the terminal specifically displays what interface or prompts the user that the unlocking fails in what way, which can be referred to in the prior art and is not described herein again.
S309, the terminal displays a first interface, and the first interface is associated with the terminal function of which the fingerprint information has the access right.
Alternatively, as shown in fig. 2, when the processor 101 is integrated with an application processor, the application processor calls data or instructions stored in the memory 103 to control the terminal screen to display the first interface.
The first interface is an interface which allows a user to have access right after fingerprint verification is passed, and is associated with certain terminal functions. For example, when the user uses the fingerprint verification function to unlock the terminal screen, the first interface may be a main screen interface displayed by the terminal after the unlocking is successful, or may be any display interface before the terminal locks the screen. When a user accesses an application using the fingerprint verification function, the first interface may be a functional interface of the application, for example, when the user uses the fingerprint verification function to pay, the first interface is a payment interface of a payment application. The embodiment of the application does not limit the specific display content of the first interface.
According to the fingerprint verification method provided by the embodiment of the application, after a user inputs fingerprint information through a terminal screen, if a first fingerprint image formed by splicing a plurality of imaging sub-blocks associated with the fingerprint information cannot pass verification, the terminal executes a process of adjusting the splicing parameters of the imaging sub-blocks, and splices the plurality of imaging sub-blocks after the splicing parameters are adjusted to form a second fingerprint image. Furthermore, the terminal uses the second fingerprint image to verify the identity of the user, and when the second fingerprint image passes the verification, the terminal can provide a corresponding display interface for the user, namely, the terminal provides a corresponding terminal function for the user after the second fingerprint image passes the verification. After the splicing parameters are adjusted, the sizes of the imaging sub-blocks are changed, so that the blocking effect degree among the imaging sub-blocks is correspondingly changed, and the blocking effect among the imaging sub-blocks is reduced. Therefore, the definition and the accuracy of the second fingerprint image formed by splicing the imaging sub-blocks can be high, and the success rate of fingerprint identification is improved.
In another embodiment of the present application, a way of determining the degree of overlap of fingerprint information contained in the imaged sub-blocks is provided.
The following description will be given by taking a square region where the imaged subblock is assumed to be L × L as an example.
Firstly, the fingerprint information (namely, pixels) contained in each imaged sub-block is further binarized, and the binarization mode comprises the following steps:
1. and calculating the gray average value of all pixels contained in each imaging sub-block.
Illustratively, the gray scale value of each pixel may be identified by 6 bits, i.e., each pixel may have 64 gray scale values. Of course, there may be other numbers of bits to represent the gray scale value that a pixel may have at most, and this is not limited in the embodiment of the present application.
2. And respectively comparing the gray value of each pixel in the imaging sub-block with the average gray value of the imaging sub-block, wherein the pixel which is greater than or equal to the average gray value is marked as 1, and the pixel which is less than the average gray value is marked as 0.
As an alternative to the above steps 1 and 2, when binarizing fingerprint information included in the imaged sub-block, a gray reference value may also be directly set, and the gray value of each pixel of the imaged sub-block is compared with the gray reference value, so as to obtain a binary value (i.e., 0 or 1) corresponding to each pixel in the imaged sub-block, and further obtain the binarized data of the imaged sub-block.
And then, judging whether the imaging sub-blocks have the blocking effect or not according to the binarization data of each imaging sub-block.
Specifically, in the embodiment of the present application, whether blocking artifacts exist between two imaged sub-blocks is determined by determining the "hamming distance" of the binarized data of the two imaged sub-blocks.
Firstly, the number of the same bits and the number of the different bits in the binarized data of the two imaging sub-blocks need to be judged, the number of the different bits is recorded as a score, and the process of determining the score is called a process of scoring the two imaging sub-blocks. Wherein the more different digits, the higher the score, and the greater the difference between the two imaged sub-blocks. For example, the binarized data of the two imaged sub-blocks are [1, 1, 0, 1] and [0, 1, 0, 1], respectively, and only one data bit is different, so the score is 1.
And then, comparing the scores of the two imaged subblocks with a threshold value, and when the score is smaller than the threshold value, indicating that the difference between the two imaged subblocks is small, wherein the two imaged subblocks are regarded as the blocking effect.
Here, the threshold may be set by the user for the terminal, or the terminal uses a default threshold. In one possible implementation, the threshold is related to the degree of overlap of the imaged sub-blocks in different thickness patch scenarios. For example, in the case where the terminal is pasted with the first thickness paste film, the degree of overlap of the imaged sub-blocks (which can be measured by the score in the above text, i.e., the first score) is the first degree of overlap, in the case where the terminal is pasted with the second thickness paste film, the degree of overlap of the imaged sub-blocks is the second degree of overlap, and in the case where the terminal is not pasted with the second thickness paste film, the threshold value may be determined according to the first degree of overlap (corresponding to the first score), the second degree of overlap (corresponding to the second score), and the third degree of overlap (corresponding to the third score). Optionally, an average score of the first score, the second score, and the third score is used as a threshold, or a lowest score of the three scores is the most threshold. The embodiment of the present application does not limit the specific setting manner of the threshold.
Optionally, considering that the probability that the overlapping portion of the fingerprint information included in the two imaged sub-blocks is located at the edge of the imaged sub-block may be relatively high, the regions with a certain width are sequentially selected for scoring according to the scoring step from the edge of a certain imaged sub-block to the center of the imaged sub-block. Optionally, to reduce the amount of computation, the scored area ranges from 1 to L/2, i.e., the 1/2 area in the imaging sub-block is scored. Each width region is scored, and the lowest score is used as the score of the degree of overlap between two imaged sub-blocks in the current scene (with or without film).
For each width region, the value range of the width is [1, L/2] pixels, L is the side length of the square imaging sub-block, the scoring step length is N pixels, and N is a positive integer, for example.
For ease of understanding, referring to fig. 7-1 and 7-2, an example is given in which the first imaging sub-block on the left side and the second imaging sub-block on the right side are adjacent imaging sub-blocks, and the side lengths L of the first imaging sub-block and the second imaging sub-block are both 4. With the above scoring method, assuming that the scoring step is 1, starting from the edge of the first imaging sub-block adjacent to the side of the second imaging sub-block, the area with the width of 1 is first scored, so that the binarized data of the area with the width of 1 on the rightmost side (i.e., the area 1 in fig. 7-2) in the first imaging sub-block is [1, 0, 0, 0], and the binarized data of the area with the width of 1 (i.e., the area 3 in fig. 7-2) adjacent to the first imaging sub-block in the second imaging sub-block is [1, 0, 1, 0], which have only one different bit, so that the score of the area 1 is 1 compared with the area 2. Next, the binary data of the region 2 and the region continue to be compared, the binary data of the region 2 is [0, 0, 0, 0], the binary data of the region 4 is [0, 1, 1, 0], and therefore, the score of comparing the region 2 with the region 4 is 2. So far, the division of the half area region in the imaging sub-block is completed.
It can be seen that the lowest score is 1, and assuming that the threshold value is 4, the terminal looks at the blocking effect between the first imaging sub-block and the second imaging sub-block because the lowest score 1 is less than the threshold value 4.
The width of the region and the scoring step may be set separately, for example, the region with the width of 2 may be scored at a time. In addition, the width of each scoring region may be different, for example, a region with a width of 2 is selected for scoring for the first time, a region with a width of 1 is selected for scoring for the second time, and so on, and the specific numerical values of the scoring regions and the scoring step length are not limited in the embodiment of the present application.
Of course, only one imaging sub-block scoring mode is described above, and other imaging sub-block scoring modes may also be adopted in the embodiment of the present application, that is, the embodiment of the present application is not limited thereto.
For example, a binary approach of successive approximation may also be taken to score the imaged sub-blocks. As shown in fig. 8, starting from a scoring process of a half-area region where a first imaging sub-block is adjacent to a second imaging sub-block, scores of the region 1 and the region shown in fig. 8 are directly calculated, the binarized data of the region 1 is [1, 0, 0, 0, 0, 0, 0, 0], the binarized data of the region 2 is [1, 0, 1, 0, 0, 1, 1, 0], the score of the region 1 compared with the region 2 is 3, and since the score 3 is smaller than the threshold 4, it can be directly determined that a blocking effect exists between the first imaging sub-block and the second imaging sub-block, a subsequent scoring process is not required, and the efficiency of the scoring process is improved.
It is understood that in order to implement the above functions, the terminal includes a corresponding hardware structure and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative algorithm steps described in connection with the embodiments disclosed herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the terminal may be divided into the functional modules according to the method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
In the case of dividing each functional module by corresponding functions, fig. 9 shows a possible composition diagram of the terminal involved in the above embodiment, as shown in fig. 9, the terminal 900 may include: a detection unit 901, a splicing unit 902, an adjustment unit 903, a display unit 904, a verification unit (not shown in the figure for simplification of fig. 9), and a judgment unit (not shown in the figure).
The detection unit 901 may be used to support the terminal 900 to execute step S301 in the fingerprint authentication method shown in fig. 3. The stitching unit 902 may be configured to support the terminal 900 to execute the stitching unit 902 of step S302 in the fingerprint verification method shown in fig. 3, and may also be configured to support the terminal 900 to execute the sub-step of stitching the imaged sub-blocks according to the target stitching parameters of the imaged sub-blocks in step S306 in the fingerprint verification method shown in fig. 3. The authentication unit may be used to support the terminal 900 to perform step S303 in the fingerprint authentication method shown in fig. 3. The determination unit may be used to support the terminal 900 to perform steps S304, S305, S307 in the fingerprint authentication method shown in fig. 3. The adjusting unit 903 may be configured to support the terminal 900 to perform the sub-step of adjusting the current stitching parameter of the imaged sub-blocks to the target stitching parameter in step S306 in the fingerprint verification method shown in fig. 3. The display unit 904 may be used to support the terminal 900 to perform steps S308, S309 of the fingerprint authentication method shown in fig. 3.
It should be noted that all relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
The terminal provided by the embodiment of the application is used for executing the fingerprint verification method, so that the same effect as the fingerprint verification method described in fig. 3 can be achieved.
In the case of using an integrated unit, the detection unit 901, the splicing unit 902, the adjustment unit 903, the verification unit, and the determination unit may be integrated as a processing module, and the display unit 904 may be integrated as a display module.
Wherein the processing module is configured to control and manage the actions of the terminal, e.g., the processing module is configured to support the terminal to perform steps S301 to S307 in fig. 3, and/or other processes for the techniques described herein. The display module may be used to support the terminal to execute steps S308 and S309 in fig. 3, and may also display a graphical user interface, image or parameter information, and the like to the user. The terminal may also include a communication module to enable the terminal to communicate with other devices, such as a server.
The processing module may be the processor 101 or the controller shown in fig. 2.
The display module may be the display 104-2 shown in fig. 2.
The communication module may be the rf circuit 102, the bluetooth device 105, the WIFI device 107, etc. shown in fig. 2.
In addition, the terminal 900 may further include a storage module for storing a processing type input by the user, the imaged sub-block, the preset image, and a program code of the storage terminal. The storage module may be the memory 103 shown in fig. 2.
The embodiment of the present application further provides a computer storage medium, where a computer instruction is stored in the computer storage medium, and when the computer instruction runs on a terminal, the terminal is enabled to execute the above related method steps to implement the fingerprint verification method in the above embodiment.
The embodiment of the present application further provides a computer program product, which when running on a computer, causes the computer to execute the above related steps to implement the fingerprint authentication method in the above embodiment.
In addition, embodiments of the present application also provide an apparatus, which may be specifically a chip, a component or a module, and may include a processor and a memory connected to each other; the memory is used for storing computer execution instructions, and when the device runs, the processor can execute the computer execution instructions stored in the memory, so that the chip can execute the fingerprint verification method in the above-mentioned method embodiments.
In addition, the terminal, the computer storage medium, the computer program product, or the chip provided in the embodiments of the present application are all configured to execute the corresponding method provided above, so that the beneficial effects achieved by the terminal, the computer storage medium, the computer program product, or the chip may refer to the beneficial effects in the corresponding method provided above, and are not described herein again.
Through the description of the above embodiments, those skilled in the art will understand that, for convenience and simplicity of description, only the division of the above functional modules is used as an example, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, a module or a unit may be divided into only one logic function, and may be implemented in other ways, for example, a plurality of units or components may be combined or integrated into another apparatus, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (17)
1. A fingerprint verification method is applied to a terminal, the terminal is provided with a screen and a photosensitive device, and the method comprises the following steps:
the terminal detects fingerprint information input by a user through a screen, wherein the fingerprint information is associated with a plurality of imaging sub-blocks formed on the photosensitive device, and each imaging sub-block comprises at least partial fingerprint information;
the terminal splices the imaging sub-blocks to obtain a first fingerprint image for verifying the identity of the user;
when the first fingerprint image is verified, if the verification fails and at least two imaging subblocks with a blocking effect exist in a plurality of imaging subblocks used for splicing the first fingerprint image, the terminal respectively adjusts the current splicing parameter of each imaging subblock in the plurality of imaging subblocks to be a target splicing parameter, and splices each imaging subblock according to the respective target splicing parameter of each imaging subblock to obtain a second fingerprint image, wherein the blocking effect is used for representing that the overlapping degree of fingerprint information contained in each of the two imaging subblocks is larger than or equal to a threshold value, and the splicing parameter is used for representing the size of the imaging subblock; the target splicing parameter of the imaging subblocks is the splicing parameter of the imaging subblocks when the blocking effect does not exist; when the terminal verifies the first fingerprint image, and the verification fails and at least two imaging subblocks with block effect exist in a plurality of imaging subblocks for splicing the first fingerprint image, pasting a film on a screen of the terminal;
and when the second fingerprint image passes the verification, the terminal displays a first interface, and the first interface is associated with a terminal function of which the fingerprint information has the access right.
2. The fingerprint authentication method according to claim 1, wherein the terminal respectively adjusts the current splicing parameter of each of the plurality of imaged sub-blocks to a target splicing parameter, and comprises:
the terminal displays a preset image on a screen, wherein under the condition that the terminal is not pasted with a film initially, the preset image is imaged on the photosensitive device to form a first image;
the terminal acquires a second image of the preset image on the photosensitive device, wherein the second image is a new image of the preset image on the photosensitive device;
and the terminal respectively adjusts the current splicing parameter of each imaging sub-block in the plurality of images into a target splicing parameter according to the first image and the second image.
3. The fingerprint authentication method of claim 2, wherein the target stitching parameter is related to a ratio of a size of the first image and a size of the second image.
4. The fingerprint authentication method according to claim 1, wherein the terminal respectively adjusts the current splicing parameter of each of the plurality of imaged sub-blocks to a target splicing parameter, and comprises:
the terminal gradually reduces the size of each imaging subblock according to a preset step length, and judges whether at least two imaging subblocks with block effect exist in the plurality of imaging subblocks after the size of the imaging subblock is reduced each time until the block effect does not exist between any two imaging subblocks;
and the terminal takes the splicing parameters of each imaging sub-block as the respective target splicing parameters of each imaging sub-block when the block effect does not exist.
5. The fingerprint authentication method according to claim 1, wherein the degree of overlap of the fingerprint information contained in each of the two imaged sub-blocks is positively correlated to the thickness of the attached film.
6. The fingerprint authentication method of claim 5, wherein the preset step size is related to the thickness of the terminal film.
7. The fingerprint authentication method of claim 1, wherein after the terminal authenticates the first fingerprint image and fails authentication, the method further comprises:
and if the blocking effect does not exist between every two imaging sub-blocks in the first fingerprint image, the terminal displays a second interface for prompting the user to re-enter the fingerprint information.
8. A terminal, characterized in that the terminal comprises:
the detection unit is used for detecting fingerprint information input by a user through a screen, the fingerprint information is associated with a plurality of imaging sub-blocks formed on the photosensitive device, and each imaging sub-block comprises at least part of fingerprint information;
the splicing unit is used for splicing the imaging sub-blocks to obtain a first fingerprint image used for verifying the identity of a user;
the adjusting unit is used for adjusting the current splicing parameter of each imaging subblock in the plurality of imaging subblocks to a target splicing parameter when the first fingerprint image is verified and if the verification fails and at least two imaging subblocks with block effect exist in the plurality of imaging subblocks for splicing the first fingerprint image; the target splicing parameter of the imaging subblocks is the splicing parameter of the imaging subblocks when the blocking effect does not exist; when the terminal verifies the first fingerprint image, and the verification fails and at least two imaging subblocks with block effect exist in a plurality of imaging subblocks for splicing the first fingerprint image, pasting a film on a screen of the terminal;
the splicing unit is further configured to splice each imaging subblock according to a target splicing parameter of each imaging subblock obtained by the adjusting unit to obtain a second fingerprint image, where the blocking effect is used to represent that the overlapping degree of fingerprint information included in each of the two imaging subblocks is greater than or equal to a threshold, and the splicing parameter is used to represent the size of the imaging subblock;
and the display unit is used for displaying a first interface when the second fingerprint image passes verification, and the first interface is associated with a terminal function of which the fingerprint information has access authority.
9. The terminal of claim 8,
the adjusting unit is configured to adjust the current stitching parameter of each of the plurality of imaging sub-blocks to a target stitching parameter, and includes: the terminal is used for displaying a preset image on a screen, wherein in the case that the terminal is not pasted with a film at the beginning, the preset image is imaged on the photosensitive device to form a first image; acquiring a second image of the preset image on the photosensitive device, wherein the second image is a new image of the preset image on the photosensitive device; and respectively adjusting the current splicing parameter of each imaging sub-block in the plurality of images to be a target splicing parameter according to the first image and the second image.
10. The terminal of claim 9, wherein the target stitching parameter is related to a ratio of a size of the first image and a size of the second image.
11. The terminal of claim 8,
the adjusting unit is configured to adjust the current stitching parameter of each of the plurality of imaging sub-blocks to a target stitching parameter, and includes: the imaging sub-blocks are used for reducing the size of each imaging sub-block gradually according to a preset step length, and judging whether at least two imaging sub-blocks with block effect exist in the plurality of imaging sub-blocks after the size of the imaging sub-blocks is reduced each time until the block effect does not exist between any two imaging sub-blocks; and respectively taking the splicing parameters of each imaging sub-block when the blocking effect does not exist as the respective target splicing parameters of each imaging sub-block.
12. The terminal according to claim 8, wherein the degree of overlap of the fingerprint information contained in each of the two imaged sub-blocks is positively correlated to the thickness of the attached film.
13. A terminal as claimed in claim 12, wherein the predetermined step size is related to the thickness of the terminal film.
14. The terminal of claim 8,
the display unit is further configured to display a second interface for prompting a user to re-enter fingerprint information if no blocking effect exists between every two imaging sub-blocks in the first fingerprint image.
15. A terminal comprising one or more processors and one or more memories;
the one or more memories coupled to the one or more processors for storing computer program code comprising computer instructions which, when executed by the one or more processors, cause the terminal to perform the fingerprint authentication method of any one of claims 1-7.
16. A computer-readable storage medium comprising computer instructions which, when run on a terminal, cause the terminal to perform the fingerprint verification method according to any one of claims 1-7.
17. Circuitry, characterized in that the circuitry comprises processing circuitry configured to perform the fingerprint verification method according to any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810869183.9A CN110795713B (en) | 2018-08-01 | 2018-08-01 | Fingerprint verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810869183.9A CN110795713B (en) | 2018-08-01 | 2018-08-01 | Fingerprint verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110795713A CN110795713A (en) | 2020-02-14 |
CN110795713B true CN110795713B (en) | 2022-04-05 |
Family
ID=69425196
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810869183.9A Active CN110795713B (en) | 2018-08-01 | 2018-08-01 | Fingerprint verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110795713B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417951B (en) * | 2020-09-30 | 2022-06-24 | 北京极豪科技有限公司 | Fingerprint image calibration method and device, electronic equipment and storage medium |
CN114299351A (en) * | 2021-12-24 | 2022-04-08 | 珠海豹趣科技有限公司 | Image processing method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942537A (en) * | 2014-04-04 | 2014-07-23 | 王曙光 | Liquid crystal terminal device, fingerprint image collection method and fingerprint collector |
CN104182727A (en) * | 2014-05-16 | 2014-12-03 | 深圳印象认知技术有限公司 | Ultra-thin fingerprint and palm print collection device, and fingerprint and palm print collection method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201721492A (en) * | 2015-12-10 | 2017-06-16 | 台瀚科技股份有限公司 | Sandwich type fingerprint recognition device |
-
2018
- 2018-08-01 CN CN201810869183.9A patent/CN110795713B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942537A (en) * | 2014-04-04 | 2014-07-23 | 王曙光 | Liquid crystal terminal device, fingerprint image collection method and fingerprint collector |
CN104182727A (en) * | 2014-05-16 | 2014-12-03 | 深圳印象认知技术有限公司 | Ultra-thin fingerprint and palm print collection device, and fingerprint and palm print collection method |
Also Published As
Publication number | Publication date |
---|---|
CN110795713A (en) | 2020-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4109218B1 (en) | Mobile phone comprising a touch screen with an in-display fingerprint sensor | |
US10255278B2 (en) | Mobile terminal and controlling method thereof | |
AU2018399177B2 (en) | Electronic transaction method and terminal | |
CN108256853B (en) | Payment method and mobile terminal | |
US10241737B2 (en) | Mobile terminal and method for controlling the same | |
US11645644B2 (en) | Mobile terminal | |
CN110581831B (en) | Communication method, information acquisition method, electronic device, and storage medium | |
WO2018161540A1 (en) | Fingerprint registration method and related product | |
US20180217809A1 (en) | Earphones, mobile terminal connectable thereto, and control method | |
CN110503159B (en) | Character recognition method, device, equipment and medium | |
KR20180095196A (en) | Mobile terminal and method for controlling the same | |
CN111125601A (en) | File transmission method, device, terminal, server and storage medium | |
US20190042831A1 (en) | Mobile terminal | |
CN110795713B (en) | Fingerprint verification method and device | |
CN115797401B (en) | Verification method and device for alignment parameters, storage medium and electronic equipment | |
US10997578B2 (en) | Mobile terminal and control method thereof | |
CN108429856A (en) | A kind of location information acquisition methods and mobile terminal | |
CN110909264A (en) | Information processing method, device, equipment and storage medium | |
CN113099378B (en) | Positioning method, device, equipment and storage medium | |
US10027791B2 (en) | Mobile terminal | |
CN108710789B (en) | Unlocking method and terminal equipment | |
KR20150061449A (en) | Electronic Device And Method Of Controlling The Same | |
CN110933305B (en) | Electronic equipment and focusing method | |
WO2020000155A1 (en) | Fingerprint collecting method and electronic device | |
KR20170071334A (en) | Mobile terminal and operating method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |