WO2017113380A1 - 一种指纹识别的方法、装置及触摸屏终端 - Google Patents
一种指纹识别的方法、装置及触摸屏终端 Download PDFInfo
- Publication number
- WO2017113380A1 WO2017113380A1 PCT/CN2015/100297 CN2015100297W WO2017113380A1 WO 2017113380 A1 WO2017113380 A1 WO 2017113380A1 CN 2015100297 W CN2015100297 W CN 2015100297W WO 2017113380 A1 WO2017113380 A1 WO 2017113380A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- time
- working mode
- fingerprint
- application
- identification module
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3206—Monitoring of events, devices or parameters that trigger a change in power modality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/325—Power saving in peripheral device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- the present application relates to the field of smart terminal technologies, and in particular, to a fingerprint recognition method and device, and a touch screen terminal.
- the user needs the touch screen terminal to determine the permission of the fingerprint of the touch operation for each touch operation on the touch screen terminal, that is, the fingerprint recognition module is called to make a series of fingerprints of the touch operation.
- Processing such as detection, collection, identification, matching, etc., requires the fingerprint recognition module to be always on.
- the fingerprint recognition module is always on, which will increase the system processing capacity, resulting in great loss of the power of the touch screen terminal and reducing the standby time.
- the embodiment of the present invention provides a method and a device for fingerprint identification, and a touch screen terminal, which are used to solve the problem that the touch screen terminal in the prior art has large power consumption and short standby time.
- a method for fingerprint identification including:
- the terminal When the terminal detects that a touch operation for triggering an application occurs on the touch screen, the terminal determines whether the execution of the application requires fingerprint authentication, wherein the fingerprint identification module is configured to The fingerprint used by the touch operation generated on the touch screen is authenticated;
- the terminal continues to maintain the fingerprint when it is determined that the application does not require fingerprint authentication. Processing is performed on the application in a state where the recognition module is turned off.
- the method further includes:
- the fingerprint recognition module After performing the processing of the set duration for the application, the fingerprint recognition module is turned on to authenticate the fingerprint used by the touch operation;
- the fingerprint identification module After determining that the authentication is passed, the fingerprint identification module is closed.
- the method further includes:
- the terminal maintains the open state of the fingerprint recognition module until the fingerprint is collected.
- the terminal determines whether the application requires the fingerprint Certification, including:
- the terminal determines whether the execution of the application requires fingerprint authentication according to the security level of the application.
- the terminal determines whether the execution of the application requires a fingerprint Certification, including:
- the terminal determines, according to the received parameter carried in the fingerprint authentication request sent by the application, whether the application requires fingerprint authentication.
- the terminal determines that performing the application does not require fingerprint authentication, including:
- the terminal determines, according to the received parameter carried in the fingerprint authentication request sent by the application, that performing the application does not require fingerprint authentication; or
- the terminal determines, according to the received parameter carried in the fingerprint authentication request sent by the application, that the last fingerprint authentication result is determined to be passed, and performs the last fingerprint authentication when the application requires fingerprint authentication.
- the time of the current time is within the preset duration, it is determined that the application is not required to perform fingerprint authentication.
- the method further includes:
- the terminal determines that the application needs fingerprint authentication, the terminal opens the fingerprint identification module to authenticate the fingerprint used by the touch operation;
- a device for fingerprint identification including:
- Monitoring unit for monitoring a touch operation occurring on the touch screen in a state where the fingerprint recognition module is turned off;
- a determining unit configured to: if the monitoring unit detects that a touch operation for triggering an application occurs on the touch screen, determine whether performing the application requires fingerprint authentication; wherein the fingerprint identification module is configured to use the touch screen The fingerprint used on the touch operation generated on the authentication;
- an execution unit configured to perform processing on the application program while continuing to maintain the fingerprint identification module off, when the determining unit determines that the application does not require fingerprint authentication.
- the execution unit is further configured to:
- the fingerprint recognition module After performing the processing of the set duration for the application, the fingerprint recognition module is turned on to authenticate the fingerprint used by the touch operation;
- the fingerprint identification module After determining that the authentication is passed, the fingerprint identification module is closed.
- the executing unit is specifically configured to:
- the terminal After the fingerprint identification module is enabled, before the fingerprint authentication is performed, if the fingerprint is not collected, the terminal maintains the open state of the fingerprint recognition module until the fingerprint is collected.
- the determining unit is specifically configured to:
- the security level of the application it is determined whether execution of the application requires fingerprint authentication.
- the determining unit is specifically configured to:
- the determining unit is specifically configured to:
- the execution unit is further configured to:
- the fingerprint identification module is enabled to authenticate the fingerprint used by the touch operation
- a method for fingerprint identification including:
- the terminal receives the first identity authentication request, performs the first identity authentication, determines that the first identity authentication is passed, and records the first time;
- the terminal receives a touch operation for triggering an application at a second time when the fingerprint recognition module is in the first working mode
- the fingerprint identification module is in a first working mode, including:
- the fingerprint identification module is in a completely closed state; or the fingerprint recognition module is in a semi-closed state; wherein the fully closed state means that the fingerprint identification module cannot be used to detect a touch operation, and collect and identify a fingerprint;
- the semi-closed state means that the fingerprint identification module can be used to detect a touch operation, but cannot be used to collect and identify a fingerprint that generates a touch operation, or the fingerprint recognition module only detects a touch operation, but does not collect a fingerprint.
- the fingerprint identification module is in a second working mode, and includes:
- the fingerprint identification module can be used at least to detect and identify a fingerprint in which a touch operation occurs.
- the terminal is configured according to the first time, the second time, and a preset And a time threshold for determining whether to switch the fingerprint identification module from the first working mode to the second working mode, including:
- the terminal calculates a time interval between the first time and the second time according to the first time and the second time;
- the method further includes:
- the terminal After the first time, the terminal is marked as the third time of the preset time threshold by the time interval of the first time, and the identifier is marked as invalid, or the identifier is deleted for the authentication.
- the identification bit passed.
- the terminal according to the first time, the second time, and a preset time threshold a value, determining whether to switch the fingerprint identification module from the first working mode to the second working mode, including:
- the terminal determines that the identifier for authenticating the authentication exists, the terminal determines to continue to maintain the fingerprint identification module in the first working mode.
- the method further includes:
- the expiration time is set according to the first time and a preset time threshold.
- the terminal according to the first time, the second time, and a preset time threshold, Determining whether to switch the fingerprint identification module from the first working mode to the second working mode comprises:
- the terminal determines that the second time is after the expiration time, the terminal determines to switch the fingerprint identification module from the first working mode to the second working mode;
- the terminal determines that the second time is before the expiration time, the terminal determines to continue to maintain the fingerprint identification module in the first working mode.
- the terminal is at least according to the first time And determining, by the second time, and the preset time threshold, whether to switch the fingerprint identification module from the first working mode to the second working mode, including:
- the sequenced signature information determines whether to switch the fingerprint identification module from the first working mode to the second working mode.
- an eighth possible implementation manner of the third aspect if the terminal performs the first identity authentication by authenticating the fingerprint by the fingerprint identification module, After the first time, the terminal switches the fingerprint identification module from the second working mode to the first working mode.
- the triggering an application includes:
- the terminal After the terminal switches the fingerprint identification module from the first working mode to the second working mode, waiting for receiving the second identity authentication request, and after performing the second identity authentication request, the terminal performs Authentication.
- a fourth aspect provides a device for fingerprint identification, which is applied to a terminal, and includes:
- a first receiving unit configured to receive a first identity authentication request
- the processing unit is configured to: after the first receiving unit receives the first identity authentication request, perform the first identity authentication, confirm that the first identity authentication passes, and record the first time.
- a second receiving unit configured to receive a touch operation for triggering an application at a second time when the fingerprint recognition module is in the first working mode
- a determining unit configured to determine whether to switch the fingerprint identification module from the first working mode to the second working mode according to at least the first time, the second time, and a preset time threshold.
- the fingerprint identification module is in a first working mode, including:
- the fingerprint identification module is in a completely closed state; or the fingerprint recognition module is in a semi-closed state; wherein the fully closed state means that the fingerprint identification module cannot be used to detect a touch operation And collecting and recognizing the fingerprint; the semi-closed state means that the fingerprint identification module can be used to detect a touch operation, but cannot be used for collecting and recognizing a fingerprint generating a touch operation, or the fingerprint recognition module Only detect touch operations, but do not collect and identify fingerprints;
- the fingerprint identification module is in a second working mode, and includes:
- the fingerprint identification module can be used at least to detect and identify a fingerprint in which a touch operation occurs.
- the determining unit is configured to:
- the setting unit is configured to set, at the first time, an identifier bit for characterizing the passing of the authentication
- the time interval from the first time is the third time of the preset time threshold, marking the identifier bit as invalid, or deleting the identifier used to represent the authentication pass Bit.
- the determining unit is configured to:
- the decision is made. Continuing to maintain the fingerprint identification module in the first mode of operation.
- the setting unit is further configured to:
- the expiration time is set according to the first time and a preset time threshold.
- the determining unit is configured to:
- the determining unit is configured to:
- a working mode is switched to the second working mode.
- the processing unit performs the first identity authentication by using the fingerprint identification module to authenticate the fingerprint
- the processing unit is further configured to switch the fingerprint identification module from the second working mode to the first working mode after the first time.
- the triggering an application includes:
- the processing unit waits to receive the second identity authentication request, and after receiving the second identity authentication request, Perform identity authentication.
- a fifth aspect provides a touch screen terminal, including: a processor, a transceiver, and a memory, wherein the processor, the transceiver, and the memory are all connected to a bus, wherein:
- the processor configured to read a set of programs stored in the memory, such that the touch screen terminal performs any one of the first to sixth possible implementations of the first aspect and the first aspect
- the fingerprint authentication module when the fingerprint authentication module is in the closed state, a touch operation for triggering an application program is received, and if it is determined that the application program does not need to perform fingerprint authentication, the closed state of the fingerprint identification module is continued. After executing the application for a certain period of time, the fingerprint authentication module is re-enabled to perform fingerprint authentication, thereby saving the power consumption of the fingerprint authentication module and prolonging the standby time of the terminal while ensuring the security during use of the terminal.
- FIG. 1a and 1b are flowcharts of a method for fingerprint recognition in an embodiment of the present application
- FIG. 2 is a flowchart of a fingerprint identification method according to a first example in the embodiment of the present application
- FIG. 3 is a flowchart of a fingerprint identification method according to a second example in the embodiment of the present application.
- FIG. 4 is a flowchart of a fingerprint identification method according to a third example in the embodiment of the present application.
- FIG. 5 and FIG. 6 are structural diagrams of a device for fingerprint recognition according to an embodiment of the present application.
- FIG. 7 is a structural diagram of a touch screen terminal according to an embodiment of the present application.
- the terminal when the terminal ensures the secure use of the touch screen terminal, the terminal closes the fingerprint identification module, reduces the power consumption of the fingerprint recognition module, and prolongs the standby time of the terminal.
- the touch screen terminal involved in the present application is hereinafter referred to as a terminal, and the terminal may include, but is not limited to, a mobile electronic device such as a mobile phone or a tablet computer.
- the fingerprint identification method provided by the present application can be applied to any biometric identification module that recognizes user identity rights, and is not limited to the fingerprint identification module.
- a biometric recognition module such as a voiceprint recognition module, a face recognition module, a blood pressure recognition module, a heart rate recognition module, an iris recognition module, and a palmprint recognition module.
- the idea of the method provided by the present application can be fully applied, and also has the beneficial effect of extending the standby time of the terminal.
- the present application is exemplified only by the method of fingerprint recognition.
- the concepts of the application involved in the present application may include, but are not limited to, application software on the terminal, specific services or specific operations or specific functions in the application software.
- the embodiment of the present application provides a fingerprint identification method, and the specific process is as follows:
- Step 100a The terminal receives the first identity authentication request, performs the first identity authentication, determines that the first identity authentication passes, and records the first time.
- the first time may be: a time when the identity authentication request is received, or a time when the authentication is passed.
- the time at which the action is recorded is different.
- the recording action may be performed before the identity authentication is performed, or after the identity authentication is performed, and the recording action must be after the authentication is passed.
- Step 101a The terminal is in the first working mode when the fingerprint identification module is in the second time Receive a touch operation that triggers an application.
- the triggering an application includes: starting the application, or executing a function in the application, or switching the application from the background to the foreground.
- the fingerprint identification module has two working modes, wherein the fingerprint identification module is in the first working mode, and may include, but is not limited to, the fingerprint recognition module is in a completely closed state or in a semi-closed state.
- the fully closed state means that the fingerprint identification module cannot be used for detecting a touch operation, and collecting and identifying a fingerprint
- the semi-closed state means that the fingerprint identification module can be used to detect a touch operation, but cannot be used to collect and identify a fingerprint that generates a touch operation, or the fingerprint recognition module can be used to detect a touch operation, and can also The fingerprint of the touch operation is generated for collection and recognition, but only the touch operation is detected during the application process, but the fingerprint is not collected and recognized;
- the fingerprint identification module is in a second working mode, and includes:
- the fingerprint identification module can be used at least to detect and identify a fingerprint in which a touch operation occurs.
- the fingerprint identification module that is, the fingerprint sensor.
- the fingerprint sensor includes a 200*200 electrode array
- the feature point information on the fingerprint can be completely collected, and the collected fingerprint can be matched with the template in the fingerprint template library stored locally by the terminal.
- the fingerprint template library here refers to a fingerprint having operation authority that has been registered and registered on the terminal.
- the fact that the fingerprint recognition module is in the completely closed state means that the terminal does not supply power to the 200*200 electrode array at all, and the fingerprint recognition module does not work. It is impossible to detect, collect, and identify fingerprints that have touch operations.
- the fingerprint recognition module is in a semi-closed state, that is, the terminal only supplies power to the 20*20 electrode array in the 200*200 electrode array, so that the fingerprint identification module can only detect the fingerprint through the 20*20 electrode array. Touch operation, but the feature point information cannot be collected and recognized for the fingerprint of the touch operation.
- the fingerprint identification module has a possible working condition that the terminal supplies power to the electrode array of 200*200, and the fingerprint recognition module can not only detect the touch operation, but also collect and recognize the fingerprint, but the fingerprint recognition module only detects the touch operation. The fingerprints currently touched are not collected and identified.
- Step 102 The terminal determines whether to switch the fingerprint identification module from the first working mode to the second working mode according to at least the first time, the second time, and a preset time threshold.
- the terminal If the first identity authentication of the terminal is to authenticate the fingerprint through the fingerprint identification module, and the fingerprint identification module is in an open state, that is, in the second working mode, the terminal is after the first time
- the fingerprint identification module is switched from the second mode of operation to the first mode of operation.
- the terminal calculates a time interval between the first time and the second time according to the first time and the first time; and calculates the time interval obtained by using Set the time threshold for comparison;
- the terminal sets, at the first time, an identifier for characterizing the passing of the authentication
- the terminal After the first time, the terminal is marked as the third time of the preset time threshold by the time interval of the first time, and the identifier is marked as invalid, or the identifier is deleted for the authentication. Passing mark;
- the terminal determines that the identifier for authenticating the authentication exists, the terminal determines to continue to maintain the fingerprint identification module in the first working mode.
- the terminal sets the expiration time of the result of the authentication pass at the first time
- the expiration time is set according to the first time and a preset time threshold
- the terminal determines that the second time is after the expiration time, the terminal determines to switch the fingerprint identification module from the first working mode to the second working mode;
- the terminal determines that the second time is before the expiration time, the terminal determines to continue to maintain the fingerprint identification module in the first working mode.
- the terminal determines, in addition to the first time, the second time, and the preset time threshold, whether the fingerprint recognition module is used by the first working mode according to other factors. Switch to the second working mode. Specifically:
- the terminal combines the preset security level of the application, the application type of the application, and the fingerprint sent by the application. Determining whether to switch the fingerprint identification module from the first working mode to the first parameter by at least one of a parameter carried in the authentication request, a frequency of use of the application, an installation time of the application, and signature information of the application Two working modes.
- the security level of the application includes at least: a high level of security level indicating that the execution application requires fingerprint authentication, and a low level indicating that the execution application does not require fingerprint authentication.
- the terminal calculates a time interval between the first time and the second time according to the first time and the second time; and calculates the obtained time interval and a preset time. The threshold is compared. If the time interval is not greater than the preset time threshold, but the security level of the application is determined to be a high level in combination with the security level of the application, then the fingerprint identification module is determined to be The first working mode is switched to the second working mode. The judgments of other combined factors are the same and will not be described here.
- the terminal does not need to switch the fingerprint identification module from the first working mode to the second working mode during the determining process; if the signature information of the application includes the information that the terminal allows for safe use, The terminal does not need to switch the fingerprint identification module from the first working mode to the second working mode during the judging process.
- the above-mentioned identity authentication may be a password or a personal identification number (PIN) input by the user, or a biometric parameter such as a fingerprint, a voiceprint, an iris, a face recognition, a palm print, a heart rate, etc., and do not do this. limit.
- PIN personal identification number
- Step 100b If the terminal detects that a touch operation for triggering an application occurs on the touch screen, the terminal determines whether the execution of the application requires fingerprint authentication.
- the terminal collects the fingerprint of the user and sets the corresponding user identity right when the user performs registration.
- the fingerprint identification module is configured to authenticate the user identity right when the user touches, that is, to authenticate the fingerprint used by the touch operation generated on the touch screen.
- the statement of fingerprint authentication is equivalent to the statement of user identity authority authentication.
- the terminal does not always open the fingerprint identification module, and when the certain conditions are met, the fingerprint identification module is closed.
- the terminal generally has a screen unlocking program, which can unlock the screen by recognizing the fingerprint. After the screen is unlocked, if the terminal detects that the terminal is in contact with the user through the border sensor, that is, the machine does not leave the hand, the terminal closes the fingerprint identification module. .
- the triggering an application includes starting an application, or executing an operation in the application after opening an application.
- triggering an application may be to open a music playing software in the mobile phone. It may be an operation of playing, pausing, etc. on a song after the music playing software is turned on.
- the terminal determines whether the application needs fingerprint authentication according to the following A and/or B.
- the term “and/or” is merely an association relationship describing the associated object, indicating that there may be three relationships, A and/or B, which may indicate that A exists separately, A and B exist simultaneously, and B exists separately. three situations.
- A The terminal determines whether the execution of the application requires fingerprint authentication according to the security level of the application.
- the terminal sets the security level of the application according to the application category of the application in advance, and the security level set for the application includes but is not limited to two levels: a high level of security level indicating that the execution application needs fingerprint authentication, and a characterization execution
- the application does not require a low level of security with low fingerprint authentication.
- the application categories are movie, game, social, and financial, and the movie, game, and social applications are set to a low level, and the financial application is set to a high level.
- the terminal determines, according to the received parameter carried in the fingerprint authentication request sent by the application, whether the application requires fingerprint authentication.
- Some applications have both high security level operations and low security level operations.
- the application will actively send the parameters to the terminal.
- the fingerprint authentication request carries parameters for determining whether the application requires fingerprint authentication.
- the social application has both an operation involving only chat and an operation involving a money transaction, and when it involves an operation involving money transactions, such as payment, transfer, etc., the application takes the initiative.
- a fingerprint authentication request carrying a parameter is sent to the terminal, and the terminal determines, according to the carried parameter, whether the application requires fingerprint authentication.
- Step 101b The terminal continues to maintain the dimension when it is determined that the application does not require fingerprint authentication.
- the processing is performed on the application in a state where the fingerprint recognition module is turned off.
- the terminal determines that the security level of the application is a low level according to the method A, it is determined that the application is not required to perform fingerprint authentication.
- the fingerprint authentication result is stored every time the terminal performs a fingerprint authentication operation.
- the terminal reads the retained last fingerprint authentication result, determines that it is passed, and does not exceed the preset duration range, and determines that the current execution application does not require user identity authority authentication. .
- a certain time threshold may be set according to an attribute of the application, and when the time for executing the processing on the application exceeds a corresponding time threshold, that is, the processing of setting the duration of the application is performed.
- the fingerprint identification module is turned on to authenticate the fingerprint used by the touch operation. For example, for financial applications, a relatively short time threshold can be set, such as 2 minutes; for a movie-like application, a relatively long time threshold, such as 45 minutes, can be set; and after the authentication is determined, The fingerprint identification module is closed. After the fingerprint identification module is enabled, before the fingerprint authentication is performed, if the fingerprint is not collected, the terminal maintains the open state of the fingerprint recognition module until the fingerprint is collected.
- the terminal when determining that the application requires fingerprint authentication, the terminal starts the fingerprint identification module to authenticate the fingerprint used by the touch operation; and after determining that the authentication is passed, performs processing on the application, and The fingerprint identification module is closed.
- the terminal determines that the security level of the application is a high level according to the method A, determining that the application needs to perform fingerprint authentication; or
- Determining that the application is required to perform fingerprint authentication is performed according to the received parameter carried in the fingerprint authentication request sent by the application.
- the fingerprint identification method in the embodiment of the present application is further described in detail according to the foregoing method A and method B, in combination with a specific application scenario.
- the fingerprint identification method of the first example is as follows.
- Step 201 The terminal collects and registers the fingerprint of the user in advance.
- the fingerprint of the user is collected by the fingerprint registration module of the terminal, and the fingerprint of the collected user is saved and recorded, and the association relationship between the saved fingerprint and the corresponding permission is established.
- Step 202 The terminal identifies an application in the application that needs to use the fingerprint authentication authority.
- the terminal judges all local applications and identifies an application that needs to use the fingerprint identification module.
- Step 203 The terminal divides the identified application into a security level.
- At least two levels of security For example, a high-level, high-level level that characterizes the execution of an application that requires fingerprint authentication, and a low-level that characterizes that the execution application does not require fingerprint authentication.
- Step 204 In the standby state, the registered terminal is used to unlock the terminal screen.
- the fingerprint recognition module will be activated.
- the fingerprint recognition module authenticates the fingerprint that detects the touch operation
- the terminal screen will be unlocked after the authentication is passed.
- Step 205 After the terminal unlocks the screen, if the terminal detects that the terminal is in contact with the user through the border sensor or the like, that is, the machine does not leave the hand, the terminal closes the fingerprint identification module.
- the method in which the detecting machine does not leave the hand is not limited in the embodiment of the present application.
- Step 206 The terminal monitors that a touch operation for triggering an application occurs on the touch screen.
- Step 207 The terminal determines whether the security level of the application is a low level. If yes, step 208 is performed; otherwise, step 209 is performed.
- Step 208 Maintain the closed state of the fingerprint identification module, and start the application normally. And return to step 206.
- the terminal does not maintain the closed state of the fingerprint identification module, but re-opens the fingerprint identification module based on a certain policy, and authenticates the collected fingerprint. Perform processing on the application.
- Step 209 The fingerprint identification module is turned on, the fingerprint of the touch operation is collected and authenticated, and the application is started when the authentication is passed. And return to step 206.
- the fingerprint identification method of the second example is as follows.
- Step 301 The terminal collects and registers the fingerprint of the user in advance.
- Step 302 In the standby state, the registered terminal is used to unlock the terminal screen.
- Step 303 After the terminal unlocks the screen, if the terminal detects that the terminal is in contact with the user through the border sensor or the like, that is, the machine does not leave the hand, the terminal closes the fingerprint identification module.
- Step 304 The terminal monitors a touch behavior occurring on the touch screen for triggering an operation in the application (possibly for a certain service or a certain function, etc.).
- Step 305 The application sends a fingerprint authentication request carrying the first parameter to the terminal, where the first parameter indicates whether fingerprint authentication must be performed when the operation in the application is performed.
- Step 306 The terminal determines whether the fingerprint identification module needs to be enabled according to the parameter in the fingerprint authentication request sent by the received application. If yes, step 307 is performed; otherwise, step 308 is performed.
- Step 307 is the same as step 209 above, step 308 is the same as step 208 above, and the repeated steps are not described again. After step 307 is executed and step 308 is executed, step 204 is returned.
- the fingerprint identification method of the third example is as follows.
- Steps 401 to 404 are the same as steps 301 to 304, and are not described here.
- Step 405 The application sends a fingerprint authentication request carrying the second parameter to the terminal, where the second parameter indicates whether the operation in the application can accept the latest fingerprint authentication result. If yes, go to step 406, otherwise go to step 410.
- Step 406 The terminal determines, according to the second parameter, whether the operation in the application can accept the last fingerprint authentication result. If yes, go to step 407, otherwise go to step 410.
- Step 407 Determine whether the result of the last fingerprint authentication is a pass, and if yes, execute step 408; otherwise, perform step 410.
- Step 408 It is determined that the duration of the last fingerprint authentication from the current time is within a preset duration, and if yes, step 409 is performed, otherwise step 410 is performed.
- Step 409 Normally start the operation in the application, and return to step 404.
- Step 410 The fingerprint identification module is turned on, the fingerprint of the touch operation is collected and authenticated, and the application is started when the authentication is passed. And return to step 404.
- Step 409 is the same as step 308 and step 308 and step 307, and the repeated description is not repeated.
- the embodiment of the present application further provides a device 50 for fingerprint identification, including a monitoring unit 51, a determining unit 52, and an executing unit 53. among them,
- the monitoring unit 51 is configured to monitor a touch operation occurring on the touch screen in a state where the fingerprint recognition module is turned off;
- the determining unit 52 is configured to: if the monitoring unit 51 detects that a touch operation for triggering an application occurs on the touch screen, determine whether execution of the application requires fingerprint authentication; wherein the fingerprint identification module is used for The fingerprint used in the touch operation generated on the touch screen is authenticated;
- the executing unit 53 is configured to perform processing on the application program while continuing to maintain the fingerprint identification module off, when the determining unit 52 determines that the application does not require fingerprint authentication.
- the execution unit 53 is further configured to:
- the fingerprint recognition module After performing the processing of the set duration for the application, the fingerprint recognition module is turned on to authenticate the fingerprint used by the touch operation;
- the fingerprint identification module After determining that the authentication is passed, the fingerprint identification module is closed.
- the executing unit 53 is specifically configured to:
- the terminal After the fingerprint identification module is enabled, before the fingerprint authentication is performed, if the fingerprint is not collected, the terminal maintains the open state of the fingerprint recognition module until the fingerprint is collected.
- the determining unit 52 is specifically configured to:
- the security level of the application it is determined whether execution of the application requires fingerprint authentication.
- the determining unit 52 is specifically configured to:
- the determining unit 52 is specifically configured to:
- the execution unit 53 is further configured to:
- the fingerprint identification module is turned on to authenticate the fingerprint used by the touch operation;
- the embodiment of the present application further provides another device for fingerprint identification 60, which is applied to a terminal, and includes:
- the first receiving unit 61 is configured to receive a first identity authentication request.
- the processing unit 62 is configured to perform a first identity authentication on the first identity authentication request received by the first receiving unit 61, determine that the identity authentication passes, and record the first time.
- the second receiving unit 63 is configured to receive a touch operation for triggering an application at a second time when the fingerprint recognition module is in the first working mode;
- the determining unit 64 is configured to determine whether to switch the fingerprint identification module from the first working mode to the second working mode according to at least the first time, the second time, and a preset time threshold.
- the fingerprint identification module is in the first working mode, and includes:
- the fingerprint identification module is in a completely closed state; or is in a semi-closed state; the semi-closed state means that the fingerprint identification module can be used to detect a fingerprint in which a touch operation occurs, but cannot be used to identify a fingerprint that generates a touch operation. ;
- the fingerprint identification module is in a second working mode, and includes:
- the fingerprint identification module can be used for detecting and recognizing at least a fingerprint in which a touch operation occurs.
- the determining unit 64 is configured to:
- the setting unit 65 is configured to set, at the first time, an identifier bit for characterizing the passing of the authentication
- the time interval from the first time is the third time of the preset time threshold, marking the identifier bit as invalid, or deleting the identifier used to represent the authentication pass Bit.
- the determining unit 64 is configured to:
- the setting unit 65 is further configured to:
- the expiration time is set according to the first time and a preset time threshold.
- the determining unit 64 is configured to:
- the determining unit 64 is configured to:
- a working mode is switched to the second working mode.
- the processing unit 62 implements the first identity authentication by performing authentication on the fingerprint by the fingerprint identification module, the processing unit 62, after the first time, the fingerprint identification module by the The second mode of operation switches to the first mode of operation.
- the triggering an application comprises:
- the processing unit 62 waits for the second identity authentication request after the fingerprint identification module is switched from the first working mode to the second working mode, and receives the second time. After the identity authentication request, identity authentication is performed.
- the terminal 70 includes a processor 71, a transceiver 72, and a memory 73.
- the processor 71, the transceiver 72, and the memory 73 are all connected to a bus, where:
- the processor 71 is configured to read a set of programs stored in the memory 73, so that the touch screen terminal 70 performs the fingerprint identification method provided by the embodiment of the present application.
- the bus architecture may include any number of interconnected buses and bridges, specifically linked by one or more processors represented by processor 71 and various circuits of memory represented by memory 73.
- the bus architecture can also link various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be further described herein.
- the bus interface provides an interface.
- Transceiver 72 can be a plurality of components, including a transmitter and a receiver, providing means for communicating with various other devices on a transmission medium.
- the user interface 74 may also be an interface capable of externally connecting the required devices, including but not limited to a keypad, a display, a speaker, a microphone, a joystick, and the like.
- the processor 71 is responsible for managing the bus architecture and general processing, and the memory 73 can store data used by the processor 71 in performing operations.
- the fingerprint authentication module when the fingerprint authentication module is in the closed state, a touch operation for triggering an application program is received, and if it is determined that the application program does not need to perform fingerprint authentication, the fingerprint is continuously maintained. Identifying the closed state of the module, and after executing the application for a certain period of time, re-opening the fingerprint authentication module to perform fingerprint authentication, thereby saving the power consumption of the fingerprint authentication module and prolonging the terminal while ensuring the security during use of the terminal. Standby time.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- Image Input (AREA)
- Telephone Function (AREA)
- Collating Specific Patterns (AREA)
Abstract
一种指纹识别的方法、装置及触摸屏终端,用于节省指纹识别模块的用电量。该方法为:在指纹认证模块处于关闭状态时,接收到发生用于触发某一应用程序的触摸操作,若判定执行该应用程序不需要执行指纹认证,则继续维持指纹识别模块的关闭状态,并在执行该应用程序一定时长以后,重新开启指纹认证模块执行指纹认证,这样在保证终端使用过程中的安全性的同时,节省指纹认证模块的用电量,延长了终端的待机时间。
Description
本申请涉及智能终端技术领域,特别涉及一种指纹识别的方法、装置及触摸屏终端。
随着电子行业迅猛发展和智能终端的普及,触摸屏终端应用的越来越广泛,为了提高触摸屏终端应用的安全性,屏幕识别指纹的方案大量涌出,随之而来的全屏识别指纹的技术也日渐成熟。全屏识别指纹技术使屏幕的任意一处都可以成为指纹感应处,进一步提高触摸屏终端应用的安全性和便利性。
但是,基于全屏识别指纹的技术应用,用户在触摸屏终端上针对屏幕每发生一次触摸操作,都需要触摸屏终端判断发生触摸操作的指纹的权限,即调用指纹识别模块对发生触摸操作的指纹作一系列处理,如检测、采集、识别、匹配等,这就需要指纹识别模块一直处于开启状态。而指纹识别模块一直处于开启状态将会增加系统处理量,造成触摸屏终端电量极大的损耗,减少待机时间。
发明内容
本申请实施例提供一种指纹识别的方法、装置及触摸屏终端,用以解决现有技术中存在的触摸屏终端耗电量较大、待机时间较短的问题。
第一方面,提供一种指纹识别的方法,包括:
终端在关闭指纹识别模块的状态下,若监测到触摸屏上发生用于触发一个应用程序的触摸操作,则判断执行所述应用程序是否需要指纹认证;其中,所述指纹识别模块用于对所述触摸屏上产生的触摸操作所使用的指纹进行认证;
终端在判定执行所述应用程序不需要指纹认证时,在继续维持所述指纹
识别模块关闭的状态下对所述应用程序执行处理。
结合第一方面,在第一方面的第一种可能的实现方式中,还包括:
在对所述应用程序执行设定时长的处理后,开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证;并
在确定认证通过后,关闭所述指纹识别模块。
结合第一方面的第一种可能的实现方式,在第一方面的第二种可能的实现方式中,在开启所述指纹识别模块后,执行指纹认证前,还包括:
若未采集到指纹,则终端维持指纹识别模块的开启状态,直到采集到指纹。
结合第一方面、第一方面的第一种、第二种可能的实现方式中的任一种,在第一方面的第三种可能的实现方式中,终端判断执行所述应用程序是否需要指纹认证,包括:
终端根据所述应用程序的安全级别,判定执行所述应用程序是否需要指纹认证。
结合第一方面、第一方面的第一种、第二种可能的实现方式中的任一种,在第一方面的第四种可能的实现方式中,终端判断执行所述应用程序是否需要指纹认证,包括:
终端根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序是否需要指纹认证。
结合第一方面的第四种可能的实现方式,在第一方面的第五种可能的实现方式中,终端判定执行所述应用程序不需要指纹认证,包括:
终端根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序不需要指纹认证;或
终端根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序需要指纹认证时,在确定保留的最近一次指纹认证结果为通过、且执行所述最近一次指纹认证的时刻距当前时刻的时长在预设时长范围内时,则判定执行所述应用程序不需要指纹认证。
结合第一方面和第一方面的第一种至第五种可能的实现方式中的任意一种,在第一方面的第六种可能的是实现方式中,还包括:
终端在判定执行所述应用程序需要指纹认证时,则开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证;并
在确定认证通过后,对所述应用程序执行处理,并关闭所述指纹识别模块。
第二方面,提供一种指纹识别的装置,包括:
监测单元:用于在关闭指纹识别模块的状态下,监测触摸屏上发生的触摸操作;
判断单元:用于若所述监测单元检测到触摸屏上发生用于触发一个应用程序的触摸操作,则判断执行所述应用程序是否需要指纹认证;其中,所述指纹识别模块用于对所述触摸屏上产生的触摸操作所使用的指纹进行认证;
执行单元,用于在所述判断单元判定执行所述应用程序不需要指纹认证时,在继续维持所述指纹识别模块关闭的状态下对所述应用程序执行处理。
结合第二方面,在第二方面的第一种可能的实现方式中,所述执行单元还用于:
在对所述应用程序执行设定时长的处理后,开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证;并
在确定认证通过后,关闭所述指纹识别模块。
结合第二方面的第一种可能的实现方式,在第二方面的第二种可能的实现方式中,所述执行单元具体用于:
在开启所述指纹识别模块后,执行指纹认证前,若未采集到指纹,则终端维持指纹识别模块的开启状态,直到采集到指纹。
结合第二方面、第二方面的第一种、第二种可能的实现方式中的任一种,在第二方面的第三种可能的实现方式中,所述判断单元具体用于:
根据所述应用程序的安全级别,判定执行所述应用程序是否需要指纹认证。
结合第二方面、第二方面的第一种、第二种可能的实现方式中的任一种,在第二方面的第四种可能的实现方式中,所述判断单元具体用于:
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序是否需要指纹认证。
结合第二方面的第四种可能的实现方式,在第二方面的第五种可能的实现方式中,所述判断单元具体用于:
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序不需要指纹认证;或
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序需要指纹认证时,在确定保留的最近一次指纹认证结果为通过、且执行所述最近一次指纹认证的时刻距当前时刻的时长在预设时长范围内时,则判定执行所述应用程序不需要指纹认证。
结合第二方面和第二方面的第一种至第五种可能的实现方式中的任意一种,在第二方面的第六种可能的是实现方式中,所述执行单元还用于:
在所述判断单元判定执行所述应用程序需要指纹认证时,则开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证;并
在确定认证通过后,对所述应用程序执行处理,并关闭所述指纹识别模块。
第三方面,提供一种指纹识别的方法,包括:
终端接收第一次身份认证请求,执行第一次身份认证,确定所述第一次身份认证通过,记录第一时间;
所述终端在指纹识别模块处于第一工作模式下,在第二时间接收用于触发一个应用程序的触摸操作;
所述终端至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
结合第三方面,在第三方面的第一种可能的实现方式中,所述指纹识别模块处于第一工作模式,包括:
所述指纹识别模块处于完全关闭状态;或所述指纹识别模块处于半关闭状态;其中,所述完全关闭状态是指所述指纹识别模块不能用于检测触摸操作,以及对指纹进行采集和识别;所述半关闭状态是指所述指纹识别模块能够用于检测触摸操作,但不能用于对产生触摸操作的指纹进行采集和识别,或所述指纹识别模块只检测触摸操作,但不对指纹进行采集和识别;
所述指纹识别模块处于第二工作模式,包括:
所述指纹识别模块至少能够用于对发生触摸操作的指纹进行检测并识别。
结合第三方面或第三方面的第一种可能的实现方式,在第三方面的第二种可能的实现方式中,所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式,包括:
所述终端根据所述第一时间、所述第二时间,计算所述第一时间和所述第二时间之间的时间间隔;并,
将计算获得的所述时间间隔与预设的时间阈值进行比较;
若所述时间间隔大于所述预设的时间阈值,则将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
若所述时间间隔不大于所述预设的时间阈值,则决定继续维持所述指纹识别模块处于所述第一工作模式。
结合第三方面或第三方面的第一种可能的实现方式,在第三方面的第三种可能的实现方式中,还包括:
所述终端在所述第一时间设置用于表征认证通过的标识位;
所述终端在所述第一时间后,距离所述第一时间的时间间隔为所述预设的时间阈值的第三时间,将所述标识位标记为失效,或者删除所述用于表征认证通过的标识位。
结合第三方面的第三种可能的实现方式,在第三方面的第四种可能的实现方式中,所述终端根据所述第一时间、所述第二时间、以及预设的时间阈
值,决定是否将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式,包括:
所述终端在所述第二时间,若确定所述标识位标记为失效,或确定所述用于表征认证通过的标识位已被删除,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
所述终端在所述第二时间,若确定存在所述用于表征认证通过的标识位,则决定继续维持所述指纹识别模块处于所述第一工作模式。
结合第三方面或第三方面的第一种可能的实现方式,在第三方面的第五种可能的实现方式中,还包括:
所述终端在第一时间设置所述认证通过的结果的失效时间;
所述失效时间是根据所述第一时间和预设的时间阈值设定的。
结合第三方面的第五种可能的实现方式,在第三方面的第六种可能的实现方式中,所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式,包括:
所述终端在所述第二时间,若确定所述第二时间位于所述失效时间之后,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
所述终端在所述第二时间,若确定所述第二时间位于所述失效时间之前,则决定继续维持所述指纹识别模块处于所述第一工作模式。
结合第三方面和第三方面的第一种至第六种可能的实现方式中的任一种,在第三方面的第七种可能的实现方式中,所述终端至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式,包括:
所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,结合预设所述应用程序的安全级别、或者,结合所述应用程序的应用类型、或者,结合所述应用程序发出的指纹认证请求中携带的参数、或者,结合所述应用程序的使用频率、或者,结合应用程序的安装时间、或者,结合应用程
序的签名信息,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
结合第三方面的第一种可能的实现方式,在第三方面的第八种可能的实现方式中,若所述终端通过指纹识别模块对指纹进行认证来实现第一次身份认证,则所述终端在所述第一时间后,将所述指纹识别模块由所述第二工作模式切换至所述第一工作模式。
结合第三方面和第三方面的第一种至第八种可能的实现方式中的任一种,在第三方面的第九种可能的实现方式中,所述触发一个应用程序,包括:
启动所述应用程序、或执行所述应用程序中的功能、或将所述应用程序由后台切换至前台。
结合第三方面和第三方面的第一种至第九种可能的实现方式中的任一种,在第三方面的第十种可能的实现方式中,
所述终端将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式后,等待接收第二次身份认证请求,并在接收到所述第二次身份认证请求后,执行身份认证。
第四方面,提供一种指纹识别的装置,应用于终端,包括:
第一接收单元,用于接收第一次身份认证请求;
处理单元,用于在所述第一接收单元接收到所述第一次身份认证请求后,执行第一次身份认证,确认所述第一次身份认证通过,记录第一时间。
第二接收单元,用于在指纹识别模块处于第一工作模式下,在第二时间接收用于触发一个应用程序的触摸操作;
判定单元,用于至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。结合第四方面,在第四方面的第一种可能的实现方式中,所述指纹识别模块处于第一工作模式,包括:
所述指纹识别模块处于完全关闭状态;或所述指纹识别模块处于半关闭状态;其中,所述完全关闭状态是指所述指纹识别模块不能用于检测触摸操
作,以及对指纹进行采集和识别;所述半关闭状态是指所述指纹识别模块能够用于检测触摸操作,但不能用于对产生触摸操作的指纹进行采集和识别,或所述指纹识别模块只检测触摸操作,但不对指纹进行采集和识别;
所述指纹识别模块处于第二工作模式,包括:
所述指纹识别模块至少能够用于对发生触摸操作的指纹进行检测并识别。
结合第四方面或第四方面的第一种可能的实现方式,在第四方面的第二种可能的实现方式中,所述判定单元用于:
根据所述第一时间、所述第一二时间,计算所述第一时间和所述第二时间之间的时间间隔;并,
将计算获得的所述时间间隔与预设的时间阈值进行比较;
若所述时间间隔大于所述预设的时间阈值,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
若所述时间间隔不大于所述预设的时间阈值,则决定继续维持所述指纹识别模块处于所述第一工作模式。
结合第四方面或第四方面的第一种可能的实现方式,在第四方面的第三种可能的实现方式中,还包括设置单元;
所述设置单元,用于在所述第一时间设置用于表征认证通过的标识位;
在所述第一时间后,距离所述第一时间的时间间隔为所述预设的时间阈值的第三时间,将所述标识位标记为失效,或者删除所述用于表征认证通过的标识位。
结合第四方面的第三种可能的实现方式,在第四方面的第四种可能的实现方式中,所述判定单元用于:
在所述第二时间,若确定所述标识位标记为失效,或确定所述用于表征认证通过的标识位已被删除,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
在所述第二时间,若确定存在所述用于表征认证通过的标识位,则决定
继续维持所述指纹识别模块处于所述第一工作模式。
结合第四方面或第四方面的第一种可能的实现方式,在第四方面的第五种可能的实现方式中,所述设置单元还用于:
在所述第一时间设置所述认证通过的结果的失效时间;
所述失效时间是根据所述第一时间和预设的时间阈值设定的。
结合第四方面的第五种可能的实现方式,在第四方面的第六种可能的实现方式中,所述判定单元用于:
在所述第二时间,若确定所述第二时间位于所述失效时间之后,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
在所述第二时间,若确定所述第二时间位于所述失效时间之前,则决定继续维持所述指纹识别模块处于所述第一工作模式。
结合第四方面和第四方面的第一种至第六种可能的实现方式中的任一种,在第四方面的第七种可能的实现方式中,所述判定单元用于:
根据所述第一时间、所述第二时间、以及预设的时间阈值,结合预设所述应用程序的安全级别、或者,结合所述应用程序的应用类型、或者,结合所述应用程序发出的指纹认证请求中携带的参数、或者,结合所述应用程序的使用频率、或者,结合应用程序的安装时间、或者,结合应用程序的签名信息,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
结合第四方面的第一种可能的实现方式,在第四方面的第八种可能的实现方式中,若所述处理单元通过指纹识别模块对指纹进行认证来实现第一次身份认证,则所述处理单元还用于,在所述第一时间后,将所述指纹识别模块由所述第二工作模式切换至所述第一工作模式。
结合第四方面和第四方面的第一种至第八种可能的实现方式中的任一种,在第四方面的第九种可能的实现方式中,所述触发一个应用程序,包括:
启动所述应用程序、或执行所述应用程序中的功能、或将所述应用程序由后台切换至前台。
结合第四方面和第四方面的第一种至第八种可能的实现方式中的任一种,在第四方面的第九种可能的实现方式中,
所述处理单元将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式后,等待接收第二次身份认证请求,并在接收到所述第二次身份认证请求后,执行身份认证。
第五方面,提供一种触摸屏终端,包括:处理器、收发机、存储器,所述处理器、所述收发机、所述存储器均与总线连接,其中:
所述处理器,用于读取所述存储器中存储的一组程序,使得所述触摸屏终端执行如第一方面和第一方面的第一种至第六种可能的实现方式中的任一种所述的方法,以及执行如第三方面和第三方面的第一种至第十种可能的实现方式中的任一种所述的方法。
本申请实施例中,在指纹认证模块处于关闭状态时,接收到发生用于触发某一应用程序的触摸操作,若判定执行该应用程序不需要执行指纹认证,则继续维持指纹识别模块的关闭状态,并在执行该应用程序一定时长以后,重新开启指纹认证模块执行指纹认证,这样在保证终端使用过程中的安全性的同时,节省指纹认证模块的用电量,延长了终端的待机时间。
图1a和图1b为本申请实施例中指纹识别的方法流程图;
图2为本申请实施例中第一种示例的指纹识别方法流程图;
图3为本申请实施例中第二种示例的指纹识别方法流程图;
图4为本申请实施例中第三种示例的指纹识别方法流程图;
图5和图6为本申请实施例中指纹识别的装置结构图;
图7为本申请实施例中触摸屏终端的结构图。
鉴于现有技术中指纹识别模块一直处于开启状态导致的触摸屏终端耗电
量较大、待机时间较短的问题,本申请实施例中,终端在保证触摸屏终端安全使用时,关闭指纹识别模块,降低了指纹识别模块的耗电量,延长了终端的待机时间。
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。
需要说明的是,本申请中涉及的触摸屏终端以下简称终端,终端可以包括但不限于手机、平板电脑等移动电子设备。本申请提供的指纹识别的方法可以应用于任意识别用户身份权限的生物特征识别模块,不限于指纹识别模块。例如,还可以应用于声纹识别模块,脸部识别模块,血压识别模块,心率识别模块,虹膜识别模块,掌纹识别模块等生物特征识别模块。当应用于这些生物特征识别模块时,本申请提供的方法的思想可以完全应用,同样起到延长终端待机时间的有益效果。以下,本申请仅以指纹识别的方法进行举例说明。
本申请中涉及的应用程序的概念可以包括但不限于终端上的应用软件、应用软件中的具体业务或具体操作或具体的功能。
参阅图1a所示,本申请实施例提供了一种指纹识别的方法,具体流程如下:
步骤100a:终端接收第一次身份认证请求,执行第一次身份认证,确定所述第一次身份认证通过,记录第一时间。
所述第一时间可以为:接收身份认证请求的时间、或确定认证通过的时间。对于上述两种类型的第一时间,记录动作执行的时间不同。对于接收身份认证请求的时间,记录动作可以在执行身份认证之前,也可以在执行身份认证之后,对于确定认证通过的时间,记录动作必须在认证通过之后。
步骤101a:所述终端在指纹识别模块处于第一工作模式下,在第二时间
接收用于触发一个应用程序的触摸操作。
所述触发一个应用程序,包括:启动所述应用程序、或执行所述应用程序中的功能、或将所述应用程序由后台切换至前台。
本申请中,所述指纹识别模块具有两种工作模式,其中,所述指纹识别模块处于第一工作模式,可以但不限于包括:所述指纹识别模块处于完全关闭状态;或处于半关闭状态。
所述完全关闭状态是指所述指纹识别模块不能用于检测触摸操作,以及对指纹进行采集和识别;
所述半关闭状态是指所述指纹识别模块能够用于检测触摸操作,但不能用于对产生触摸操作的指纹进行采集和识别,或所述指纹识别模块能够用于检测触摸操作,也能够对产生触摸操作的指纹进行采集和识别,但在应用过程中只检测触摸操作,但不对指纹进行采集和识别;
所述指纹识别模块处于第二工作模式,包括:
所述指纹识别模块至少能够用于对发生触摸操作的指纹进行检测并识别。
实际应用中,指纹识别模块,即指纹传感器。假设指纹传感器包含200*200的电极阵列,可完整采集指纹上的特征点信息,并可以将采集到的指纹与终端本地存储的指纹模板库中的模板进行匹配。这里的指纹模板库指的是,终端上已经注册并登记的有操作权限的指纹。
指纹识别模块处于关于完全关闭状态是指,终端完全不给200*200的电极阵列供电,指纹识别模块不工作。不能对发生触摸操作的指纹进行检测、采集、识别等工作。
而指纹识别模块处于半关闭状态是指,终端只对200*200的电极阵列中的20*20的电极阵列供电,这样,指纹识别模块只能通过所述20*20的电极阵列检测到指纹的触摸操作,但不能对触摸操作的指纹进行特征点信息的采集和识别。
另外,指纹识别模块还有一种可能的工作情况是,终端对200*200的电极阵列供电,指纹识别模块不仅能够检测触摸操作,也能够采集并识别出指纹,但指纹识别模块仅检测触摸操作,并不对当前触摸的指纹进行采集和识别。
步骤102a:所述终端至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
若所述终端的第一次身份认证是通过指纹识别模块对指纹进行认证的,所述指纹识别模块处于开启状态,也就是处于第二工作模式,则所述终端在第一时间后,将所述指纹识别模块由所述第二工作模式切换至所述第一工作模式。
所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式,可以但不限于包括以下几种方式:
第一种,所述终端根据所述第一时间、所述第一二时间,计算所述第一时间和所述第二时间之间的时间间隔;并将计算获得的所述时间间隔与预设的时间阈值进行比较;
若所述时间间隔大于所述预设的时间阈值,则将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
若所述时间间隔不大于所述预设的时间阈值,则决定继续维持所述指纹识别模块处于所述第一工作模式。
第二种,所述终端在所述第一时间,设置用于表征认证通过的标识位;
所述终端在所述第一时间后,距离所述第一时间的时间间隔为所述预设的时间阈值的第三时间,将所述标识位标记为失效,或者删除所述用于表征认证通过的标识位;
所述终端在所述第二时间,若确定所述标识位标记为失效,或确定所述用于表征认证通过的标识位已被删除,则决定将所述指纹识别模块由所述第
一工作模式切换至所述第二工作模式;
所述终端在所述第二时间,若确定存在所述用于表征认证通过的标识位,则决定继续维持所述指纹识别模块处于所述第一工作模式。
第三种,所述终端在所述第一时间,设置所述认证通过的结果的失效时间;
所述失效时间是根据所述第一时间和预设的时间阈值设定的;
所述终端在所述第二时间,若确定所述第二时间位于所述失效时间之后,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
所述终端在所述第二时间,若确定所述第二时间位于所述失效时间之前,则决定继续维持所述指纹识别模块处于所述第一工作模式。
较佳的,所述终端除了根据所述第一时间、所述第二时间、以及预设的时间阈值之外,还需结合其他因素决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。具体为:
所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,结合预设的所述应用程序的安全级别、所述应用程序的应用类型、所述应用程序发出的指纹认证请求中携带的参数、所述应用程序的使用频率、应用程序的安装时间、应用程序的签名信息中的至少一项,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
所述应用程序的安全级别至少包括:表征执行应用程序需要指纹认证的安全级别高的高级别,表征执行应用程序不需要指纹认证的安全级别低的低级别。
例如,所述终端根据所述第一时间、所述第二时间,计算所述第一时间和所述第二时间之间的时间间隔;并将计算获得的所述时间间隔与预设的时间阈值进行比较,若所述时间间隔不大于所述预设的时间阈值,但结合所述应用程序的安全级别,确定所述应用程序的安全级别为高级别,则决定将所述指纹识别模块由所述第一工作模式切换至第二工作模式。其他结合因素的判断思想相同,在此不再赘述。
其中,所述应用程序的使用频率越高,所述终端在判断过程中越不需要将所述指纹识别模块由所述第一工作模式切换至第二工作模式;应用程序的安装时间越接近当前时间,所述终端在判断过程中越不需要将所述指纹识别模块由所述第一工作模式切换至第二工作模式;若所述应用程序的签名信息中包含所述终端允许安全使用的信息,则所述终端在判断过程中越不需要将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
在上述过程中,所述终端将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式后,等待接收第二次身份认证请求,并在接收到第二次身份认证请求后,执行身份认证。
上述涉及的身份认证即可以是用户输入的密码或个人识别密码(Personal Identification Number,PIN),或是指纹、声纹、虹膜、脸部识别、掌纹、心率等生物特征参数,在此不做限制。
基于上述实施例,以下将结合具体应用场景对本申请实施例提供的指纹识别的方法作进一步详细说明。参阅图1b所示,具体流程如下:
步骤100b:终端在关闭指纹识别模块的状态下,若监测到触摸屏上发生用于触发一个应用程序的触摸操作,则判断执行所述应用程序是否需要指纹认证。
其中,在用户进行注册时,终端采集用户的指纹,并设置相应的用户身份权限。所述指纹识别模块用于,在用户发生触摸操作时,对用户身份权限进行认证,也就是对所述触摸屏上产生的触摸操作所使用的指纹进行认证。本申请实施例以下说明中,指纹认证的说法等同于用户身份权限认证的说法。
本申请实施例中,终端并不是一直开启指纹识别模块,在符合一定条件时,会关闭指纹识别模块。例如,终端一般会设置有屏幕解锁程序,可通过识别指纹对屏幕进行解锁,终端在屏幕解锁之后,若通过边框传感器检测到终端与用户保持接触,也就是机不离手,则终端关闭指纹识别模块。
在关闭指纹识别模块的状态下,若监测到触摸屏上发生用于触发一个应用程序的触摸操作,并不是立即执行该应用程序,而是先判断执行该应用程
序是否需要指纹认证。其中,所述触发一个应用程序包括开启一个应用程序、或在开启一个应用程序后执行这个应用程序中的某一个操作,举例说明,触发一个应用程序可以是开启手机中的一个音乐播放软件,也可以是在开启这个音乐播放软件后对一首歌曲执行播放、暂停等的操作。
具体地,终端根据以下A和/或B判断执行该应用程序是否需要指纹认证。其中,术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
A:终端根据所述应用程序的安全级别,判断执行所述应用程序是否需要指纹认证。
其中,终端预先根据应用程序的应用类别,设置应用程序的安全级别,为应用程序设置的安全级别包括但不限于两个级别:表征执行应用程序需要指纹认证的安全级别高的高级别、表征执行应用程序不需要指纹认证的安全级别低的低级别。例如,所述应用类别为电影类、游戏类、社交类、金融类,将电影类、游戏类、社交类的应用程序设置为低级别,将金融类的应用程序设置为高级别。
B:终端根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判断执行所述应用程序是否需要指纹认证。
其中,某些应用程序中既有安全级别高的操作,也会有安全级别低的操作,在应用程序的执行过程中,当触及安全级别高的操作时,应用程序会主动向终端发送携带参数的指纹认证请求,所携带的参数用于判断执行所述应用程序是否需要指纹认证。
例如,在一个社交应用程序中,该社交应用程序既有只涉及聊天的操作,也会设置有涉及金钱交易的操作,当涉及到付款、转账等涉及金钱交易的操作时,该应用程序会主动向终端发送携带参数的指纹认证请求,终端根据所携带的参数判断执行这个应用程序是否需要指纹认证。
步骤101b:终端在判定执行所述应用程序不需要指纹认证时,在继续维
持所述指纹识别模块关闭的状态下对所述应用程序执行处理。
具体地,终端若根据A方法判定所述应用程序的安全级别为低等级,则判定执行所述应用程序不需要指纹认证。
终端根据B方法进行判断时:
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序不需要指纹认证;或者,
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序需要指纹认证时,在确定保留的最近一次指纹认证结果为通过、且执行所述最近一次指纹认证的时刻距当前时刻的时长在预设时长范围内时,则判定执行所述应用程序不需要指纹认证。其中,终端每进行一次指纹认证操作,将指纹认证结果进行存储。在应用程序允许使用最近一次的指纹认证结果时,终端读取保留的最近一次的指纹认证结果,确定为通过、且未超过预设时长范围时,判定本次执行应用程序不需要用户身份权限认证。
进一步地,在所述应用程序执行过程中,为了保证终端的使用安全,并不是一直维持指纹识别模块的关闭状态。本申请实施例中,可以根据应用程序的属性,设置一定的时间阈值,在对所述应用程序执行处理的时间超过相应的时间阈值时,也就是在对所述应用程序执行设定时长的处理后,开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证。例如,对于金融类的应用程序,可以设置相对较短的时间阈值,比如2分钟;而对于电影类的应用程序,可以设置相对较长的时间阈值,比如45分钟;并在确定认证通过后,关闭所述指纹识别模块。在开启所述指纹识别模块后,执行指纹认证前,若未采集到指纹,则终端维持指纹识别模块的开启状态,直到采集到指纹。
另外,终端在判定执行所述应用程序需要指纹认证时,则开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证;并在确定认证通过后,对所述应用程序执行处理,并关闭所述指纹识别模块。
具体地,终端若根据A方法判定所述应用程序的安全级别为高等级,则判定执行所述应用程序需要指纹认证;或者,
终端根据B方法进行判断时:
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序需要指纹认证。
下面根据上述A方法和B方法,结合具体的应用场景对本申请实施例中的指纹识别方法作进一步详细说明。
参阅图2所示,第一种示例的指纹识别方法流程如下。
步骤201:终端预先采集并注册用户的指纹。
具体地,由终端的指纹注册模块采集用户指纹,并将采集到的用户的指纹保存、记录,以及建立保存的指纹与对应的权限之间的关联关系。
步骤202:终端识别应用程序中需要使用指纹认证权限的应用。
具体地,终端对本地所有的应用程序进行判断,识别出需要用到指纹识别模块的应用程序。
步骤203:终端对识别出的应用程序划分安全级别。
其中,至少划分为两个安全级别。例如,表征执行应用程序需要指纹认证的安全级别高的高级别、表征执行应用程序不需要指纹认证的安全级别低的低级别。
步骤204:在待机状态下,使用注册的指纹解锁终端屏幕。
这里将会开启指纹识别模块,当指纹识别模块对检测到发生触摸操作的指纹进行认证,认证通过后,将会解锁终端屏幕。
步骤205:终端在屏幕解锁之后,若通过边框传感器等方式检测到终端与用户保持接触,也就是机不离手,则终端关闭指纹识别模块。
检测机不离手的方法本申请实施例中不作限定。
步骤206:终端监测到触摸屏上发生用于触发一个应用程序的触摸操作。
步骤207:终端判断这个应用程序的安全级别是否为低级别,若是则执行步骤208,否则执行步骤209。
步骤208:维持指纹识别模块的关闭状态,正常启动该应用程序。并返回执行步骤206。
其中,在执行步骤208这个分支的过程中,终端并不会一直维持指纹识别模块的关闭状态,而是基于一定的策略,重新开启指纹识别模块,并对采集的指纹进行认证,在认证通过时对应用程序执行处理。
具体策略如步骤101b中所述,重复之处不再赘述。
步骤209:开启指纹识别模块,对发生触摸操作的指纹进行采集并认证,在认证通过时启动该应用程序。并返回执行步骤206。
参阅图3所示,第二种示例的指纹识别方法流程如下。
步骤301:终端预先采集并注册用户的指纹。
步骤302:在待机状态下,使用注册的指纹解锁终端屏幕。
步骤303:终端在屏幕解锁之后,若通过边框传感器等方式检测到终端与用户保持接触,也就是机不离手,则终端关闭指纹识别模块。
上述步骤301~步骤303与上述步骤201、步骤204、步骤205相同,重复之处不再赘述。
步骤304:终端监测到触摸屏上发生用于触发应用程序中操作(可能为某一个业务或某一个功能等)的触摸行为。
步骤305:应用程序向终端发出携带第一参数的指纹认证请求,该第一参数表明执行该应用程序中操作是否必须进行指纹认证。
步骤306:终端根据接收到的应用程序发出的指纹认证请求中的参数,判断是否需要开启指纹识别模块,若是,则执行步骤307,否则执行步骤308。
其中,步骤307同上述步骤209,步骤308如同上述步骤208,重复之处不再赘述,执行完步骤307和执行完步骤308后,均返回执行步骤204。
基于第二种示例的指纹识别方法,参阅图4所示,第三种示例的指纹识别方法流程如下。
步骤401~步骤404与步骤301~步骤304相同,在此不再赘述。
步骤405:应用程序向终端发出携带第二参数的指纹认证请求,该第二参数表明该应用程序中的操作是否可以接受最近一次指纹认证结果。若是则执行步骤406,否则执行步骤410。
步骤406:终端根据该第二参数,判断该应用程序中的操作是否可以接受最近一次指纹认证结果。若是,则执行步骤407,否则执行步骤410。
步骤407:判断所述最近一次指纹认证的结果是否为通过,若是,则执行步骤408,否则执行步骤410。
步骤408:判断执行所述最近一次指纹认证的时刻距当前时刻的时长在预设时长范围内,若是,则执行步骤409,否则执行步骤410。
步骤409:正常启动该应用程序中的操作,并返回执行步骤404。
步骤410:开启指纹识别模块,对发生触摸操作的指纹进行采集并认证,在认证通过时启动该应用程序。并返回执行步骤404。
其中步骤409与步骤410与步骤308和步骤307相同,重复之处不再赘述。
基于上述实施例,参阅图5所示,本申请实施例还提供了一种指纹识别的装置50,包括监测单元51、判断单元52和执行单元53。其中,
监测单元51:用于在关闭指纹识别模块的状态下,监测触摸屏上发生的触摸操作;
判断单元52:用于若所述监测单元51检测到触摸屏上发生用于触发一个应用程序的触摸操作,则判断执行所述应用程序是否需要指纹认证;其中,所述指纹识别模块用于对所述触摸屏上产生的触摸操作所使用的指纹进行认证;
执行单元53,用于在所述判断单元52判定执行所述应用程序不需要指纹认证时,在继续维持所述指纹识别模块关闭的状态下对所述应用程序执行处理。
较佳地,执行单元53还用于:
在对所述应用程序执行设定时长的处理后,开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证;并
在确定认证通过后,关闭所述指纹识别模块。
较佳地,执行单元53具体用于:
在开启所述指纹识别模块后,执行指纹认证前,若未采集到指纹,则终端维持指纹识别模块的开启状态,直到采集到指纹。
较佳地,判断单元52具体用于:
根据所述应用程序的安全级别,判定执行所述应用程序是否需要指纹认证。
较佳地,判断单元52具体用于:
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序是否需要指纹认证。
较佳地,判断单元52具体用于:
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序不需要指纹认证;或
根据接收到的所述应用程序发出的指纹认证请求中携带的参数,判定执行所述应用程序需要指纹认证时,在确定保留的最近一次指纹认证结果为通过、且执行所述最近一次指纹认证的时刻距当前时刻的时长在预设时长范围内时,则判定执行所述应用程序不需要指纹认证。
较佳地,执行单元53还用于:
在所述判断单元52判定执行所述应用程序需要指纹认证时,则开启所述指纹识别模块对所述触摸操作所使用的指纹进行认证;并
在确定认证通过后,对所述应用程序执行处理,并关闭所述指纹识别模块。
基于上述实施例,参阅图6所示,本申请实施例还提供了另一种指纹识别的装置60,应用于终端,包括:
第一接收单元61,用于接收第一次身份认证请求;
处理单元62,用于对第一接收单元61接收到的第一次身份认证请求执行第一次身份认证,确定身份认证通过,记录第一时间。
第二接收单元63,用于在指纹识别模块处于第一工作模式下,在第二时间接收用于触发一个应用程序的触摸操作;
判定单元64,用于至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
较佳的,所述指纹识别模块处于第一工作模式,包括:
所述指纹识别模块处于完全关闭状态;或处于半关闭状态;所述半关闭状态是指所述指纹识别模块能够用于检测发生触摸操作的指纹,但不能用于对产生触摸操作的指纹进行识别;
所述指纹识别模块处于第二工作模式,包括:
所述指纹识别模块至少能够用于对发生触摸操作的指纹进行检测、识别。
较佳的,所述判定单元64用于:
根据所述第一时间、所述第一二时间,计算所述第一时间和所述第二时间之间的时间间隔;并,
将计算获得的所述时间间隔与预设的时间阈值进行比较;
若所述时间间隔大于所述预设的时间阈值,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
若所述时间间隔不大于所述预设的时间阈值,则决定继续维持所述指纹识别模块处于所述第一工作模式。
较佳的,还包括设置单元65;
所述设置单元65,用于在所述第一时间,设置用于表征认证通过的标识位;
在所述第一时间后,距离所述第一时间的时间间隔为所述预设的时间阈值的第三时间,将所述标识位标记为失效,或者删除所述用于表征认证通过的标识位。
较佳的,所述判定单元64用于:
在所述第二时间,若确定所述标识位标记为失效,或确定所述用于表征认证通过的标识位已被删除,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
在所述第二时间,若确定存在所述用于表征认证通过的标识位,则决定继续维持所述指纹识别模块处于所述第一工作模式。
较佳的,所述设置单元65还用于:
在所述第一时间,设置所述认证通过的结果的失效时间;
所述失效时间是根据所述第一时间和预设的时间阈值设定的。
较佳的,所述判定单元64用于:
在所述第二时间,若确定所述第二时间位于所述失效时间之后,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;
在所述第二时间,若确定所述第二时间位于所述失效时间之前,则决定继续维持所述指纹识别模块处于所述第一工作模式。
较佳的,所述判定单元64用于:
根据所述第一时间、所述第二时间、以及预设的时间阈值,结合预设所述应用程序的安全级别、或者,结合所述应用程序的应用类型、或者,结合所述应用程序发出的指纹认证请求中携带的参数、或者,结合所述应用程序的使用频率、或者,结合应用程序的安装时间、或者,结合应用程序的签名信息,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
较佳的,若所述处理单元62通过指纹识别模块对指纹进行认证后的认证来实现第一次身份认证,则所述处理单元62在第一时间后,将所述指纹识别模块由所述第二工作模式切换至所述第一工作模式。
较佳的,所述触发一个应用程序,包括:
启动所述应用程序、或执行所述应用程序中的功能、或将所述应用程序由后台切换至前台。
较佳的,所述处理单元62将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式后,等待接收第二次身份认证请求,并在接收到所述第二次身份认证请求后,执行身份认证。
基于上述实施例,参阅图7所示,本申请实施例还提供了一种触摸屏终
端70,包括:处理器71、收发机72、存储器73,所述处理器71、所述收发机72、所述存储器73均与总线连接,其中:
所述处理器71,用于读取所述存储器73中存储的一组程序,使得所述触摸屏终端70执行本申请实施例提供的指纹识别的方法。
其中,在图7中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器71代表的一个或多个处理器和存储器73代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机72可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。针对不同的用户设备,用户接口74还可以是能够外接内接需要设备的接口,连接的设备包括但不限于小键盘、显示器、扬声器、麦克风、操纵杆等。
处理器71负责管理总线架构和通常的处理,存储器73可以存储处理器71在执行操作时所使用的数据。
综上所述,本申请实施例中,在指纹认证模块处于关闭状态时,接收到发生用于触发某一应用程序的触摸操作,若判定执行该应用程序不需要执行指纹认证,则继续维持指纹识别模块的关闭状态,并在执行该应用程序一定时长以后,重新开启指纹认证模块执行指纹认证,这样在保证终端使用过程中的安全性的同时,节省指纹认证模块的用电量,延长了终端的待机时间。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程
和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管已描述了本申请的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本申请范围的所有变更和修改。
显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请实施例的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
Claims (25)
- 一种指纹识别的方法,其特征在于,包括:终端接收第一次身份认证请求,执行第一次身份认证,确定所述第一次身份认证通过,记录第一时间;所述终端在指纹识别模块处于第一工作模式下,在第二时间接收用于触发一个应用程序的触摸操作;所述终端至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
- 如权利要求1所述的方法,其特征在于,所述指纹识别模块处于第二工作模式,包括:所述指纹识别模块处于第二工作模式时,用于采集和识别指纹信息;所述指纹识别模块处于第一工作模式,包括:所述指纹识别模块处于与所述第二工作模式不同的第一工作模式。
- 如权利要求1或2所述的方法,其特征在于,所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式,包括:所述终端根据所述第一时间、所述第一二时间,计算所述第一时间和所述第二时间之间的时间间隔;并,将计算获得的所述时间间隔与预设的时间阈值进行比较;若所述时间间隔大于所述预设的时间阈值,则将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;若所述时间间隔不大于所述预设的时间阈值,则决定继续维持所述指纹识别模块处于所述第一工作模式。
- 如权利要求1或2所述的方法,其特征在于,还包括:所述终端在第一时间设置用于表征认证通过的标识位;所述终端在所述第一时间后,距离所述第一时间的时间间隔为所述预设 的时间阈值的第三时间,将所述标识位标记为失效,或者删除或者重置所述用于表征认证通过的标识位。
- 如权利要求4所述的方法,其特征在于,所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式,包括:所述终端在所述第二时间,若确定所述标识位标记为失效,或确定所述用于表征认证通过的标识位已被删除,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;所述终端在所述第二时间,若确定存在所述用于表征认证通过的标识位,则决定继续维持所述指纹识别模块处于所述第一工作模式。
- 如权利要求1或2所述的方法,其特征在于,还包括:所述终端在第一时间设置所述认证通过的结果的失效时间;所述失效时间是根据所述第一时间和预设的时间阈值设定的。
- 如权利要求6所述的方法,其特征在于,所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式,包括:所述终端在所述第二时间,若确定所述第二时间位于所述失效时间之后,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;所述终端在所述第二时间,若确定所述第二时间位于所述失效时间之前,则决定继续维持所述指纹识别模块处于所述第一工作模式。
- 如权利要求1-7任一项所述的方法,其特征在于,所述终端至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式,包括:所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,结合预设的所述应用程序的安全级别,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
- 如权利要求1-7任一项所述的方法,其特征在于,所述终端至少根据 所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式,包括:所述终端根据所述第一时间、所述第二时间、以及预设的时间阈值,结合预设的所述应用程序的安全级别、所述应用程序的应用类型、所述应用程序发出的指纹认证请求中携带的参数、所述应用程序的使用频率、应用程序的安装时间、应用程序的签名信息中的至少一项,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
- 如权利要求2所述的方法,其特征在于,若所述终端通过指纹识别模块对指纹进行认证来实现第一次身份认证,则所述终端在记录所述第一时间后将所述指纹识别模块由所述第二工作模式切换至所述第一工作模式。
- 如权利要求1-10任一项所述的方法,其特征在于,所述触发一个应用程序,包括:启动所述应用程序、或执行所述应用程序中的功能、或将所述应用程序由后台切换至前台。
- 如权利要求1-11任一项所述的方法,其特征在于,包括:所述终端将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式后,等待接收第二次身份认证请求,并在接收到所述第二次身份认证请求后,执行身份认证。
- 一种指纹识别的装置,应用于终端,其特征在于,包括:第一接收单元,用于在第一时间接收第一次身份认证请求;处理单元,用于在所述第一接收单元接收到所述第一次身份认证请求后,执行第一次身份认证,确认所述第一次身份认证通过,记录第一时间;第二接收单元,用于在指纹识别模块处于第一工作模式下,在第二时间接收用于触发一个应用程序的触摸操作;判定单元,用于至少根据所述第一时间、所述第二时间、以及预设的时间阈值,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
- 如权利要求13所述的装置,其特征在于,所述指纹识别模块处于第二工作模式,包括所述指纹识别模块处于第二工作模式时,用于采集和识别指纹信息;所述指纹识别模块处于第一工作模式,包括:所述指纹识别模块处于与所述第二工作模式不同的第一工作模式。
- 如权利要求13或14所述的装置,其特征在于,所述判定单元用于:根据所述第一时间、所述第一二时间,计算所述第一时间和所述第二时间之间的时间间隔;并,将计算获得的所述时间间隔与预设的时间阈值进行比较;若所述时间间隔大于所述预设的时间阈值,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;若所述时间间隔不大于所述预设的时间阈值,则决定继续维持所述指纹识别模块处于所述第一工作模式。
- 如权利要求13或14所述的装置,其特征在于,还包括设置单元;所述设置单元,用于在所述第一时间设置用于表征认证通过的标识位;在所述第一时间后,距离所述第一时间的时间间隔为所述预设的时间阈值的第三时间,将所述标识位标记为失效,或者删除所述用于表征认证通过的标识位。
- 如权利要求16所述的装置,其特征在于,所述判定单元用于:在所述第二时间,若确定所述标识位标记为失效,或确定所述用于表征认证通过的标识位已被删除,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;在所述第二时间,若确定存在所述用于表征认证通过的标识位,则决定继续维持所述指纹识别模块处于所述第一工作模式。
- 如权利要求13或14所述的装置,其特征在于,所述设置单元还用于:在所述第一时间设置所述认证通过的结果的失效时间;所述失效时间是根据所述第一时间和预设的时间阈值设定的。
- 如权利要求18所述的装置,其特征在于,所述判定单元用于:在所述第二时间,若确定所述第二时间位于所述失效时间之后,则决定将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式;在所述第二时间,若确定所述第二时间位于所述失效时间之前,则决定继续维持所述指纹识别模块处于所述第一工作模式。
- 如权利要求13-19任一项所述的装置,其特征在于,所述判定单元用于:根据所述第一时间、所述第二时间、以及预设的时间阈值,结合预设所述应用程序的安全级别,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
- 如权利要求13-19任一项所述的装置,其特征在于,所述判定单元用于:根据所述第一时间、所述第二时间、以及预设的时间阈值,结合所述应用程序的应用类型、或者,结合所述应用程序发出的指纹认证请求中携带的参数、或者,结合所述应用程序的使用频率、或者,结合应用程序的安装时间、或者,结合应用程序的签名信息,决定是否将所述指纹识别模块由所述第一工作模式切换至第二工作模式。
- 如权利要求14所述的装置,其特征在于,若所述处理单元通过指纹识别模块对指纹进行认证来实现第一次身份认证,则所述处理单元还用于,在所述第一时间后,将所述指纹识别模块由所述第二工作模式切换至所述第一工作模式。
- 如权利要求13-22任一项所述的装置,其特征在于,所述触发一个应用程序,包括:启动所述应用程序、或执行所述应用程序中的功能、或将所述应用程序由后台切换至前台。
- 如权利要求13-23任一项所述的方法,其特征在于,包括:所述处理单元将所述指纹识别模块由所述第一工作模式切换至所述第二工作模式后,等待接收第二次身份认证请求,并在接收到所述第二次身份认证请求后,执行身份认证。
- 一种触摸屏终端,其特征在于,包括:处理器、收发机、存储器,所述处理器、所述收发机、所述存储器均与总线连接,其中:所述处理器,用于读取所述存储器中存储的一组程序,使得所述触摸屏终端执行如权利要求1-12任一项所述的方法。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201580049283.1A CN106716297B (zh) | 2015-12-31 | 2015-12-31 | 一种指纹识别的方法、装置及触摸屏终端 |
PCT/CN2015/100297 WO2017113380A1 (zh) | 2015-12-31 | 2015-12-31 | 一种指纹识别的方法、装置及触摸屏终端 |
US15/743,779 US11036840B2 (en) | 2015-12-31 | 2015-12-31 | Fingerprint recognition method and apparatus, and touchscreen terminal |
CN201910959783.9A CN110851809B (zh) | 2015-12-31 | 2015-12-31 | 一种指纹识别的方法、装置及触摸屏终端 |
US17/335,843 US11914693B2 (en) | 2015-12-31 | 2021-06-01 | Fingerprint recognition method and apparatus, and touchscreen terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/100297 WO2017113380A1 (zh) | 2015-12-31 | 2015-12-31 | 一种指纹识别的方法、装置及触摸屏终端 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/743,779 A-371-Of-International US11036840B2 (en) | 2015-12-31 | 2015-12-31 | Fingerprint recognition method and apparatus, and touchscreen terminal |
US17/335,843 Continuation US11914693B2 (en) | 2015-12-31 | 2021-06-01 | Fingerprint recognition method and apparatus, and touchscreen terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017113380A1 true WO2017113380A1 (zh) | 2017-07-06 |
Family
ID=58933706
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/100297 WO2017113380A1 (zh) | 2015-12-31 | 2015-12-31 | 一种指纹识别的方法、装置及触摸屏终端 |
Country Status (3)
Country | Link |
---|---|
US (2) | US11036840B2 (zh) |
CN (2) | CN110851809B (zh) |
WO (1) | WO2017113380A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107437017A (zh) * | 2017-07-11 | 2017-12-05 | 广东欧珀移动通信有限公司 | 生物识别模式开启方法及相关产品 |
CN111065988A (zh) * | 2017-08-29 | 2020-04-24 | 新加坡商欧之遥控有限公司 | 用于无需有意用户登记来识别用户以提供个性化指南、内容和服务以及针对性广告的方法和设备 |
EP3480685B1 (en) * | 2017-11-02 | 2023-04-19 | BlackBerry Limited | Electronic device including touchpad and fingerprint sensor and method of detecting touch |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10431024B2 (en) | 2014-01-23 | 2019-10-01 | Apple Inc. | Electronic device operation using remote user biometrics |
CN107644189B (zh) * | 2016-07-20 | 2021-02-02 | 腾讯科技(深圳)有限公司 | 一种生物特征识别的方法及装置 |
US10599823B2 (en) * | 2016-11-18 | 2020-03-24 | Invensense, Inc. | Systems and methods for coordinating applications with a user interface |
US10911452B2 (en) * | 2016-11-22 | 2021-02-02 | Synergex Group (corp.) | Systems, methods, and media for determining access privileges |
KR102302561B1 (ko) * | 2017-03-09 | 2021-09-15 | 삼성전자주식회사 | 복수의 인증 수단들을 이용하여 인증을 수행하는 전자 장치와 이의 동작 방법 |
KR20180135242A (ko) * | 2017-06-12 | 2018-12-20 | 주식회사 하이딥 | 단말 및 그 제어 방법 |
CN107391172A (zh) * | 2017-06-14 | 2017-11-24 | 努比亚技术有限公司 | 一种终端控制方法、终端及计算机可读存储介质 |
CN107451817A (zh) * | 2017-07-03 | 2017-12-08 | 广东欧珀移动通信有限公司 | 终端的支付验证方法和装置、终端和计算机可读存储介质 |
CN107480502A (zh) * | 2017-09-07 | 2017-12-15 | 广东欧珀移动通信有限公司 | 指纹识别方法、装置、移动终端及存储介质 |
CN109032323A (zh) * | 2018-06-20 | 2018-12-18 | 华勤通讯技术有限公司 | 界面显示方法及电子设备 |
CN109657441B (zh) * | 2018-11-27 | 2022-11-29 | Oppo广东移动通信有限公司 | 应用打开方法及相关装置 |
CN111723353A (zh) * | 2019-03-22 | 2020-09-29 | 北京小米移动软件有限公司 | 基于人脸识别的身份认证方法、装置、终端及存储介质 |
WO2020237577A1 (en) * | 2019-05-30 | 2020-12-03 | Zte Corporation | Bi-directional forwarding detection authentication |
CN110377139A (zh) * | 2019-06-04 | 2019-10-25 | 努比亚技术有限公司 | 一种终端控制方法、终端及计算机可读存储介质 |
CN110275660A (zh) * | 2019-06-18 | 2019-09-24 | 深圳市趣创科技有限公司 | 一种指纹快捷删除照片的方法 |
CN112307452A (zh) * | 2019-08-01 | 2021-02-02 | 银河水滴科技(北京)有限公司 | 一种应用程序运行控制方法、设备和计算机可读存储介质 |
CN111966206B (zh) * | 2020-08-06 | 2023-09-12 | Tcl通讯(宁波)有限公司 | 一种指纹感应器的省电控制方法、装置及移动终端 |
CN112035050B (zh) * | 2020-09-10 | 2022-03-04 | Oppo(重庆)智能科技有限公司 | 控制方法、控制装置、存储介质与终端设备 |
CN112799497B (zh) * | 2021-01-18 | 2024-06-07 | 北京小米移动软件有限公司 | 指纹模组的工作模式控制方法、装置及存储介质 |
FR3120956B1 (fr) * | 2021-03-19 | 2023-11-24 | Isorg | Contrôle d’accès d’applications |
EP4309058A1 (fr) * | 2021-03-19 | 2024-01-24 | Isorg | Contrôle d'accès d'applications |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006338510A (ja) * | 2005-06-03 | 2006-12-14 | Hitachi Ltd | 情報処理装置 |
US20090133117A1 (en) * | 2007-11-19 | 2009-05-21 | Avaya Inc. | Authentication Frequency And Challenge Type Based On Application Usage |
CN104376239A (zh) * | 2014-11-26 | 2015-02-25 | 小米科技有限责任公司 | 终端的解锁方法和装置 |
CN105099676A (zh) * | 2014-04-18 | 2015-11-25 | 阿里巴巴集团控股有限公司 | 一种用户登录方法、用户终端及服务器 |
CN105095744A (zh) * | 2014-05-07 | 2015-11-25 | 腾讯科技(深圳)有限公司 | 应用程序访问方法及装置 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4349789B2 (ja) * | 2002-11-06 | 2009-10-21 | 富士通株式会社 | 安全性判断装置及び安全性判断方法 |
US20100063906A1 (en) * | 2008-09-05 | 2010-03-11 | Giftango Corporation | Systems and methods for authentication of a virtual stored value card |
JP5415749B2 (ja) * | 2008-11-26 | 2014-02-12 | 京セラ株式会社 | 携帯電子機器 |
EP2601769B1 (en) * | 2010-08-04 | 2017-03-01 | BlackBerry Limited | Method and apparatus for providing continuous authentication based on dynamic personal information |
ITFI20120240A1 (it) * | 2012-11-07 | 2014-05-08 | Strumenti Oftalmici C S O S R L Costruzioni | Metodo e apparato per la misura di aberrazioni del sistema ottico di un essere vivente |
GB2517777B (en) * | 2013-08-30 | 2015-08-05 | Cylon Global Technology Inc | Data encryption and smartcard storing encrypted data |
US9898880B2 (en) * | 2013-09-10 | 2018-02-20 | Intel Corporation | Authentication system using wearable device |
CN103544422A (zh) | 2013-10-16 | 2014-01-29 | 国家电网公司 | 带有指纹识别的智能屏幕显示终端 |
KR20150060273A (ko) * | 2013-11-26 | 2015-06-03 | 엘지전자 주식회사 | 단말기 및 그 제어 방법 |
KR102206054B1 (ko) * | 2014-05-09 | 2021-01-21 | 삼성전자주식회사 | 지문 처리 방법 및 그 전자 장치 |
KR20150130188A (ko) * | 2014-05-13 | 2015-11-23 | 삼성전자주식회사 | 지문 인식을 이용한 휴대 단말장치의 제어 방법 및 그 휴대 단말 장치 |
US20160232342A1 (en) * | 2015-02-05 | 2016-08-11 | Wipro Limited | Method and system for authenticating access |
CN104794433A (zh) * | 2015-03-27 | 2015-07-22 | 深圳市汇顶科技股份有限公司 | 指纹识别系统和方法 |
CN104978572B (zh) * | 2015-06-30 | 2018-10-23 | 魅族科技(中国)有限公司 | 一种指纹采集方法及终端 |
CN105138129B (zh) * | 2015-08-28 | 2019-02-01 | 宇龙计算机通信科技(深圳)有限公司 | 左右手识别方法、装置及电子设备 |
CN105117086B (zh) | 2015-09-11 | 2018-03-27 | 小米科技有限责任公司 | 指纹识别系统、指纹识别的实现方法及装置、电子设备 |
US10181020B2 (en) * | 2015-09-21 | 2019-01-15 | American Express Travel Related Services Company, Inc. | Systems and methods for gesture based biometric security |
CN105160230B (zh) | 2015-10-09 | 2018-12-18 | 京东方科技集团股份有限公司 | 显示装置 |
KR102564267B1 (ko) * | 2016-12-01 | 2023-08-07 | 삼성전자주식회사 | 전자 장치 및 그 동작 방법 |
US11176280B2 (en) * | 2017-06-02 | 2021-11-16 | Apple Inc. | Secure circuit control to disable circuitry |
-
2015
- 2015-12-31 WO PCT/CN2015/100297 patent/WO2017113380A1/zh active Application Filing
- 2015-12-31 CN CN201910959783.9A patent/CN110851809B/zh active Active
- 2015-12-31 CN CN201580049283.1A patent/CN106716297B/zh active Active
- 2015-12-31 US US15/743,779 patent/US11036840B2/en active Active
-
2021
- 2021-06-01 US US17/335,843 patent/US11914693B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006338510A (ja) * | 2005-06-03 | 2006-12-14 | Hitachi Ltd | 情報処理装置 |
US20090133117A1 (en) * | 2007-11-19 | 2009-05-21 | Avaya Inc. | Authentication Frequency And Challenge Type Based On Application Usage |
CN105099676A (zh) * | 2014-04-18 | 2015-11-25 | 阿里巴巴集团控股有限公司 | 一种用户登录方法、用户终端及服务器 |
CN105095744A (zh) * | 2014-05-07 | 2015-11-25 | 腾讯科技(深圳)有限公司 | 应用程序访问方法及装置 |
CN104376239A (zh) * | 2014-11-26 | 2015-02-25 | 小米科技有限责任公司 | 终端的解锁方法和装置 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107437017A (zh) * | 2017-07-11 | 2017-12-05 | 广东欧珀移动通信有限公司 | 生物识别模式开启方法及相关产品 |
CN111065988A (zh) * | 2017-08-29 | 2020-04-24 | 新加坡商欧之遥控有限公司 | 用于无需有意用户登记来识别用户以提供个性化指南、内容和服务以及针对性广告的方法和设备 |
CN111065988B (zh) * | 2017-08-29 | 2023-10-24 | 新加坡商欧之遥控有限公司 | 用于无需有意用户登记来识别用户以提供个性化指南、内容和服务以及针对性广告的方法和设备 |
US11803250B2 (en) | 2017-08-29 | 2023-10-31 | Home Control Singapore Pte Ltd | Method and apparatus for recognizing user to provide personalized guide, content and services, and targeted advertisement without intentional user registration |
EP3480685B1 (en) * | 2017-11-02 | 2023-04-19 | BlackBerry Limited | Electronic device including touchpad and fingerprint sensor and method of detecting touch |
Also Published As
Publication number | Publication date |
---|---|
US20210357488A1 (en) | 2021-11-18 |
CN110851809B (zh) | 2023-10-24 |
CN106716297A (zh) | 2017-05-24 |
CN106716297B (zh) | 2019-11-05 |
CN110851809A (zh) | 2020-02-28 |
US11036840B2 (en) | 2021-06-15 |
US20180203986A1 (en) | 2018-07-19 |
US11914693B2 (en) | 2024-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017113380A1 (zh) | 一种指纹识别的方法、装置及触摸屏终端 | |
US9122913B2 (en) | Method for logging a user in to a mobile device | |
CN111835689B (zh) | 数字钥匙的身份认证方法、终端设备及介质 | |
CN106068512A (zh) | 用于在移动装置上验证用户的方法和设备 | |
WO2020078094A1 (zh) | 解锁方法、装置和门锁 | |
CN108804006B (zh) | 用于可穿戴设备的解锁方法、装置、设备和存储介质 | |
JP2006504167A (ja) | 携帯型データ記憶媒体を使って安全な電子取引を実行する方法 | |
WO2017088316A1 (zh) | 一种支付方法及其装置 | |
KR20130113486A (ko) | 모바일 상거래에서의 사용자 아이덴티티 증명 | |
CN104778587A (zh) | 一种安全支付方法及装置 | |
CN105389497A (zh) | 指纹识别的操作界面的安全验证方法及系统 | |
US11354394B2 (en) | Identity verification using autonomous vehicles | |
JP3589579B2 (ja) | 生体認証装置及びその処理プログラムを記録した記録媒体 | |
US9923976B2 (en) | Control device and control method | |
US11409853B2 (en) | System and method for authenticating before waking an information handling system | |
CN108959894A (zh) | 一种指纹控制开机的实现方法及装置、计算机可读存储介质、终端 | |
CN101470804A (zh) | 生物体认证装置 | |
US20240378273A1 (en) | Method and system for energy-efficient multi-biometric authentication | |
US20240073207A1 (en) | User authentication | |
CN104866744B (zh) | 一种信息处理方法及电子设备 | |
CN103679046A (zh) | 数据创建方法和装置、以及数据访问方法和装置 | |
WO2018006328A1 (zh) | 一种管理智能门禁的方法及智能门禁系统 | |
CN107315938A (zh) | 一种基于第三方设备的智能设备应急指纹解锁方法及系统 | |
WO2019174168A1 (zh) | 一种发送求救信息的方法、终端设备及计算机可读存储介质 | |
KR20220075722A (ko) | 개인정보 수집주체를 통한 개인정보 공유장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15912004 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15743779 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15912004 Country of ref document: EP Kind code of ref document: A1 |