Nothing Special   »   [go: up one dir, main page]

WO2018165942A1 - 终端设备和识别指纹的方法 - Google Patents

终端设备和识别指纹的方法 Download PDF

Info

Publication number
WO2018165942A1
WO2018165942A1 PCT/CN2017/076950 CN2017076950W WO2018165942A1 WO 2018165942 A1 WO2018165942 A1 WO 2018165942A1 CN 2017076950 W CN2017076950 W CN 2017076950W WO 2018165942 A1 WO2018165942 A1 WO 2018165942A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint sensor
fingerprint
terminal device
state
sensor
Prior art date
Application number
PCT/CN2017/076950
Other languages
English (en)
French (fr)
Inventor
钟志鑫
钟华
叶金春
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to PCT/CN2017/076950 priority Critical patent/WO2018165942A1/zh
Priority to CN201780000515.3A priority patent/CN107113349B/zh
Publication of WO2018165942A1 publication Critical patent/WO2018165942A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions

Definitions

  • the present application relates to the field of electronic devices and, more particularly, to a terminal device and a method of identifying a fingerprint.
  • the on-screen fingerprint sensor can be built into the screen of the mobile phone and does not have to be installed in a specific location, such as the back of the phone or the HOME button position of the phone. Therefore, it is not necessary to stick to a specific size, so that in the fingerprint recognition process, the length of the password is increased, and the security of fingerprint recognition is improved.
  • the mobile phone needs to be unlocked, it is necessary to display a specific icon in the position of the fingerprint sensor in the screen to guide the user to press the finger, thereby increasing the power consumption of the mobile phone.
  • the in-screen fingerprint technology needs to work in conjunction with the display module and the touch module of the mobile phone, the speed of fingerprint recognition verification is not as good as that of the conventional fingerprint sensor, and therefore, the user experience is poor.
  • the embodiment of the present invention provides a terminal device and a method for recognizing a fingerprint, which can balance the security of the fingerprint identification and the user experience.
  • a first aspect provides a terminal device, including: a first fingerprint sensor, a second fingerprint sensor, and a processor; the first fingerprint sensor is built in a screen of the terminal device, and the second fingerprint sensor is located at the a location other than the screen in the terminal device; the processor, configured to control an operation mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device.
  • the processor is specifically configured to: when the terminal device is in a standby state, control the first fingerprint sensor to be in an inoperative state, and the second fingerprint sensor is in an active state; Or in the case that the terminal device is in a working state and receives a user's access request for an application or a file, according to a security level of the application or file, a relationship with a preset security level threshold, the first is controlled.
  • a working mode of the fingerprint sensor and the second fingerprint sensor or when the terminal device is in an active state and does not receive a user-to-application or Controlling, by the access request of the file, that the first fingerprint sensor and the second fingerprint sensor are in an inoperative state; or in the case that the terminal device is in a shutdown state, controlling the first fingerprint sensor and the The second fingerprint sensor is in an inoperative state.
  • the processor is specifically configured to: the processor is specifically configured to:
  • the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an inactive state.
  • the processor is specifically configured to: when the terminal device is in a standby state, control the first fingerprint sensor to be in an inoperative state, and the second fingerprint sensor is in an active state; Or if the terminal device is in an active state, and receives a user's access request for an application or a file, controlling the first fingerprint sensor to be in an active state, and the second fingerprint sensor is in an inoperative state; or Controlling that the first fingerprint sensor and the second fingerprint sensor are in an inoperative state when the terminal device is in an active state and does not receive the user's access request for the application or the file; or the terminal device is in the working state; In the case of the shutdown state, both the first fingerprint sensor and the second fingerprint sensor are controlled to be in an inoperative state.
  • the processor is further configured to: acquire, by using the second fingerprint sensor, the user that the first fingerprint sensor is in an inactive state and the second fingerprint sensor is in an active state.
  • Fingerprint information fingerprinting the fingerprint information; or obtaining the fingerprint of the user through the first fingerprint sensor if the first fingerprint sensor is in an active state and the second fingerprint sensor is in an inoperative state
  • Information performing fingerprint identification on the fingerprint information; or acquiring a fingerprint of the user by using the first fingerprint sensor and the second fingerprint sensor when both the first fingerprint sensor and the second fingerprint sensor are in an active state;
  • Information fingerprinting the fingerprint information.
  • the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
  • the first fingerprint sensor is more secure than the second fingerprint sensor.
  • the second fingerprint sensor and the first fingerprint sensor In the same plane or in different planes.
  • a second aspect provides a method for identifying a fingerprint, including: controlling an operation mode of a first fingerprint sensor and a second fingerprint sensor according to a state of the terminal device, wherein the first fingerprint sensor is built in the terminal device In the screen, the second fingerprint sensor is located at a position other than the screen in the terminal device; and fingerprint recognition is performed according to an operation mode of the first fingerprint sensor and the second fingerprint sensor.
  • the controlling the working mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device including: controlling, when the terminal device is in a standby state, a fingerprint sensor is in an inoperative state, the second fingerprint sensor is in an active state; or in the case that the terminal device is in a working state and receives a user's access request for an application or a file, according to the application or file a security level, a relationship with a preset security level threshold, controlling an operation mode of the first fingerprint sensor and the second fingerprint sensor; or when the terminal device is in an active state, and not receiving a user-to-application or file Controlling the first fingerprint sensor and the second fingerprint sensor to be in an inoperative state in the case of an access request; or controlling the first fingerprint sensor and the The second fingerprint sensor is in an inoperative state.
  • the controlling a working mode of the first fingerprint sensor and the second fingerprint sensor according to a security level of the application or a file, and a preset security level threshold including: Controlling whether the first fingerprint sensor and the second fingerprint sensor are in a working state when the security level of the application or file reaches the preset security level threshold; or in the security of the application or file If the level does not reach the preset security level threshold, the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an inactive state.
  • the controlling the working mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device, including: controlling, when the terminal device is in a standby state, a fingerprint sensor is in an inoperative state, the second fingerprint sensor is in an active state; or the first fingerprint sensor is controlled if the terminal device is in an active state and receives a user access request for an application or a file
  • the second fingerprint sensor is in an inoperative state; or in the case that the terminal device is in an active state, and the user does not receive an access request for an application or a file, the first fingerprint sensor and the device are controlled.
  • the second fingerprint sensor is in an inoperative state; or the terminal device is in a shutdown state. In the case, the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
  • performing fingerprint identification according to an operation mode of the first fingerprint sensor and the second fingerprint sensor including: when the first fingerprint sensor is in an inactive state, the second When the fingerprint sensor is in the working state, the fingerprint information of the user is acquired by the second fingerprint sensor, and the fingerprint information is fingerprint-finished; or when the first fingerprint sensor is in an active state, the second fingerprint sensor is in a working state.
  • the inactive state the fingerprint information of the user is acquired by the first fingerprint sensor, and the fingerprint information is fingerprinted; or when both the first fingerprint sensor and the second fingerprint sensor are in a working state, The fingerprint information of the user is obtained by the first fingerprint sensor and the second fingerprint sensor, and the fingerprint information is fingerprint-recognized.
  • the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
  • the first fingerprint sensor is more secure than the second fingerprint sensor.
  • the second fingerprint sensor and the first fingerprint sensor are in the same plane or different planes.
  • a third aspect provides a terminal device including a memory for storing a program, the processor for executing a program, and when the program is executed, the processor is configured to perform the second aspect Methods.
  • a computer readable medium storing program code for execution by a terminal device, the program code comprising instructions for performing the method of the second aspect.
  • FIG. 1 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a method for identifying a fingerprint according to an embodiment of the present application.
  • Figure 3 is a schematic diagram of the mobile phone in a standby state.
  • FIG. 4 is a schematic diagram of a screen-out wake-up or a bright-screen unlock by a second fingerprint sensor.
  • FIG. 5 is a schematic diagram of payment type fingerprint verification by a first fingerprint sensor.
  • FIG. 1 is a schematic block diagram of a terminal device 100 according to an embodiment of the present application. As shown in FIG. 1 , the terminal device 100 may include:
  • a first fingerprint sensor 110 a second fingerprint sensor 120, and a processor 130;
  • the first fingerprint sensor 110 is built in a screen of the terminal device 100, and the second fingerprint sensor 120 is located at a position other than the screen in the terminal device;
  • the processor 130 is configured to control an operating mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device.
  • the first fingerprint sensor 110 is built in the screen of the terminal device, and the effective detection range of the first fingerprint sensor 110 may be the same as the screen size of the terminal device, that is, the entire screen.
  • the valid display area can be fingerprinted.
  • the first fingerprint sensor 110 can also be installed at a specific location in the screen, so that when the fingerprint is verified, the user needs to touch the specific location. In this case, the fingerprint verification can be performed.
  • a guide icon for indicating the installation position or the effective monitoring range of the first fingerprint sensor 110 is displayed on the screen, so as to guide the user to perform fingerprint pressing.
  • the size of the first fingerprint sensor 110 is not limited in the embodiment of the present application.
  • the first fingerprint sensor 110 may adopt an optical fingerprint sensor; for example, the screen of the terminal device may be an Organic Light-Emitting Diode (OLED) screen or other self-illuminating display.
  • OLED Organic Light-Emitting Diode
  • the reflection of the finger pressing the screen may be different. Since the peak of the fingerprint and the light path corresponding to the grain are different, the position of the peak and the valley of the finger fingerprint can be obtained by detecting the reflected light, that is, the fingerprint image is obtained. .
  • the optical fingerprint sensor itself may also include a light source and implement optical fingerprint detection using its own light source, in which case the screen may employ a non-self-illuminating display device, such as a liquid crystal display using backlight Device, etc.
  • the first fingerprint sensor 110 may also be a capacitive fingerprint sensor or an ultrasonic fingerprint sensor or the like disposed under the screen and located in its display area.
  • the second fingerprint sensor 120 may be a sensor using other fingerprint technologies, for example, a capacitive fingerprint sensor, an ultrasonic fingerprint sensor, or the first fingerprint.
  • the sensor 120 is an optical fingerprint sensor or the like.
  • the second fingerprint sensor 120 can be a push-type fingerprint sensor or a sliding fingerprint sensor, which is not limited in this application.
  • the second fingerprint sensor 120 may be in the same plane as the first fingerprint sensor 110.
  • the second fingerprint sensor 120 may be located around the screen of the terminal device, for example, a Home key position, or
  • the second fingerprint sensor 120 can also be in a different plane from the first fingerprint sensor.
  • the second fingerprint sensor 120 can be located at the back of the terminal device. The position of the second fingerprint sensor in this embodiment of the present application. Not limited.
  • the processor 130 may determine the working mode of the first fingerprint sensor and the second fingerprint sensor according to the state of the terminal device.
  • the state of the terminal device may include a shutdown state, Standby state, working state (or may also be called unlocked state).
  • the standby state may include a boot-off state and a bright-screen unlocked state.
  • the working status may include a bright screen unlocking state but does not receive a user's access request to the application or file (ie, unlocked but the user does not operate the application or file), and receives the user's access request to the application or file (ie, unlocked and the user The application or file is manipulated).
  • the working modes of the first fingerprint sensor and the second fingerprint sensor may include: (1) the first fingerprint sensor is in an active state, and the second fingerprint sensor is in an inoperative state; (2) the first fingerprint The sensor is in an inoperative state, the second fingerprint sensor is in an active state; (3) the first fingerprint sensor and the second fingerprint sensor are in an inoperative state; or, (4) the first fingerprint sensor and The second fingerprint sensor is in an active state.
  • the fingerprint sensor when the fingerprint sensor is in the working state, the finger touches the fingerprint sensor, and the fingerprint sensor can collect the fingerprint information; when the fingerprint sensor is in the non-working state, even if the finger touches the fingerprint sensor, the fingerprint sensor does not collect the fingerprint information, therefore, the fingerprint sensor It can reduce power consumption when it is not working.
  • the inactive state may include a sleep state and a power-off state, wherein when the fingerprint sensor is in the sleep state, the power supply is still turned on, but the fingerprint sensor is not awake, and therefore, the fingerprint cannot be collected, and the fingerprint sensor is in the power-off state.
  • the power supply is turned off, so fingerprints cannot be collected when the power is off.
  • the processor 130 is specifically configured to:
  • the terminal device When the terminal device is in working state and receives user access to an application or file, please In the case of obtaining, according to the security level of the application or the file, controlling the working mode of the first fingerprint sensor and the second fingerprint sensor according to a preset security level threshold; or
  • the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
  • the processor may control the first fingerprint sensor and the second fingerprint sensor to be in an inactive state when the terminal device is in a shutdown state, thereby reducing power consumption of the terminal device;
  • the second fingerprint sensor is controlled to be in an active state, and the first fingerprint sensor is in an inoperative state, because the second fingerprint sensor is smaller than the first fingerprint sensor.
  • the power consumption is low, therefore, the fingerprint verification by the second fingerprint sensor in the standby state is lower than the power consumption of the fingerprint verification by the first fingerprint sensor, and in the standby state, the screen does not have to be displayed on the screen.
  • a fingerprint sensor is mounted to guide the user to press, and thus, power consumption can be further reduced.
  • the first fingerprint sensor since the first fingerprint sensor is used for verification, it needs to cooperate with the display module and the touch module, and the fingerprint verification speed is slow, and the fingerprint verification by the second fingerprint sensor accelerates the unlocking speed, thereby Improve the user experience.
  • the screen unlocking has relatively low security requirements. Therefore, considering the security and user experience, when the screen is unlocked, the second fingerprint sensor can be used for fingerprint verification, thereby improving the user experience.
  • both the first fingerprint sensor and the second fingerprint sensor are controlled to be in an inoperative state.
  • the first fingerprint sensor is controlled to be in an inactive state
  • the second fingerprint sensor is in an active state.
  • the second fingerprint sensor may be periodically awake from the sleep state, and detecting Is there a fingerprint press? If yes, the processor is woken up to perform fingerprint matching.
  • the matching is passed, the terminal device is unlocked, and the terminal device enters a working state.
  • the processor may select a security level of the file or the application accessed according to the access request, and a preset security level threshold. And determining an operation mode of the first fingerprint sensor and the second fingerprint sensor.
  • the processor may control the first fingerprint sensor and the second if the file or the security level used reaches a preset security level threshold The fingerprint sensor is in working state, and the control only activates the first fingerprint sensor if the security level threshold is not reached.
  • the processor may control the second fingerprint sensor to be in an inoperative state, and the first fingerprint sensor is also in an inoperative state; or In the case that the user's access request to the application or file is received, the processor may determine whether to open the first fingerprint sensor or the first fingerprint sensor and the second fingerprint sensor according to the security level of the application or the file.
  • the processor may control the first fingerprint sensor and the The second fingerprint sensor is in an active state.
  • the processor may first control to activate the first fingerprint sensor, and then start the second fingerprint sensor, or start the second fingerprint sensor first, and then start the device.
  • the first fingerprint sensor may be activated, or the first fingerprint sensor and the second fingerprint sensor may be simultaneously activated, and the user determines which fingerprint sensor to input the fingerprint information first.
  • the processor firstly starts the second fingerprint sensor as an example to describe how to perform fingerprint verification.
  • the processor first starts the second fingerprint sensor.
  • the processor may control the terminal device.
  • the screen displays prompt information, the prompt information is used to prompt the user to input a fingerprint on the second fingerprint sensor, and when the second fingerprint sensor passes the verification, the first fingerprint sensor is controlled to be activated, and the finger press guide is performed.
  • the user is prompted to input a fingerprint at the position of the first fingerprint sensor.
  • the embodiment of the present application can also control the access security level to be higher than the preset security level.
  • the control is verified by the first fingerprint sensor and the second fingerprint sensor, and when both fingerprint sensors are verified to pass, the verification can be determined, thereby further improving the fingerprint verification. safety.
  • another security level threshold may also be preset, where the other security level threshold is lower than the foregoing security level threshold, and the processor may lower the security level of the application or file.
  • the second fingerprint sensor is controlled to be in an active state, and the first fingerprint sensor is in an inoperative state, that is, the fingerprint is verified by the second fingerprint sensor. Therefore, the embodiment of the present application may be When a user accesses an application or a file with a low security level threshold, the second fingerprint sensor is used for fingerprint verification, thereby speeding up the unlocking and improving the user experience.
  • the processor is specifically configured to: when the terminal device is in a standby state, control the first fingerprint sensor to be in an inactive state, the second finger The fingerprint sensor is in an active state; or in the case that the terminal device is in an active state and receives a user's access request for an application or a file, the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an active state Working state; or controlling the first fingerprint sensor and the second fingerprint sensor to be in an inoperative state if the terminal device is in an active state and the user does not receive an access request for an application or a file; or When the terminal device is in a shutdown state, the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
  • the processor when receiving the user's access request for the application or the file, the processor may directly set the first fingerprint sensor to be in a working state without determining the security level of the application or the file.
  • the second fingerprint sensor is in an inoperative state, that is, fingerprint verification is performed by the first fingerprint sensor.
  • the processor is further configured to:
  • Fingerprint recognition is performed according to an operation mode of the first fingerprint sensor and the second fingerprint sensor.
  • the first fingerprint sensor is in an inoperative state and the second fingerprint sensor is in an active state, acquiring fingerprint information of the user by using the second fingerprint sensor, and performing fingerprint identification on the fingerprint information;
  • the first fingerprint sensor When the first fingerprint sensor is in an active state and the second fingerprint sensor is in an inoperative state, acquiring fingerprint information of the user by using the first fingerprint sensor to perform fingerprint identification on the fingerprint information; or
  • the first fingerprint sensor and the second fingerprint sensor When the first fingerprint sensor and the second fingerprint sensor are in an active state, the first fingerprint sensor and the second fingerprint sensor acquire fingerprint information of the user, and perform fingerprint identification on the fingerprint information.
  • the functions performed by the processor 130 may be directly implemented by a hardware processor, or may be performed by a combination of hardware and software modules in the processor, or may be implemented by software.
  • the module is executed to complete.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium may be located in a memory of the terminal device, and the processor 130 may execute various functional applications or data processing in the terminal device by running a software program or module stored in the memory, and the memory may be
  • the utility model mainly comprises a storage program area and a storage data area, wherein the storage program area can store an operating system and at least one function required
  • the application such as a sound playing function, an image playing function, etc.
  • the storage data area can store data (such as audio data, phone book, etc.) created according to the use of the terminal device 100.
  • the memory may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the terminal device may be a mobile phone, a tablet computer, or the like, which is not limited in this embodiment of the present application.
  • the first fingerprint sensor is higher in security than the second fingerprint sensor, and the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
  • the terminal device implemented by the present application may include two fingerprint sensors, that is, a first fingerprint sensor and a second fingerprint sensor, wherein the security of the first fingerprint sensor is higher than that of the second fingerprint sensor, and the second The power consumption of the fingerprint sensor is lower than that of the first fingerprint sensor, so that when the terminal device is in the standby state, the second fingerprint sensor with less power consumption is used for unlocking, which speeds up the unlocking speed and improves the user experience, and pays in the mobile phone.
  • the first fingerprint sensor with high security or the first fingerprint sensor and the second fingerprint sensor are used for fingerprint verification, thereby improving the security of fingerprint verification, and therefore, the security of fingerprint verification can be considered. Sex and user experience.
  • the first fingerprint sensor 110 and the second fingerprint sensor 120 of the terminal device may respectively adopt different types of fingerprint sensors, such as the first A fingerprint sensor 110 employs an optical fingerprint sensor, and the second fingerprint sensor 120 employs a capacitive fingerprint sensor.
  • One of the advantages of adopting the above configuration is that some users' fingerprint characteristics make them more easily recognized by the capacitive fingerprint sensor, and some users' fingerprint characteristics make them more easily recognized by the optical fingerprint sensor, so the terminal device can be applied. The fingerprint characteristics of different users are used to effectively improve the user experience.
  • Another advantage of the above configuration is that different types of fingerprint sensors have advantages.
  • the optical fingerprint sensor can perform fingerprint recognition more effectively and accurately when wet fingers or fingers are dusty, and can also realize living body detection;
  • the capacitive fingerprint sensor has higher fingerprint recognition efficiency and shorter fingerprint unlocking time. Therefore, when the user selects one of the first fingerprint sensor 110 and the second fingerprint sensor 120 to perform fingerprint recognition in different application scenarios, the application requirements of different scenarios are met.
  • the device embodiment of the present application is described in detail above with reference to FIG. 1.
  • the method embodiment of the present application is described in detail below with reference to FIG. 2 to FIG. 5. It should be understood that the method embodiment corresponds to the device embodiment. A similar description can be referred to the device embodiment.
  • FIG. 2 is a schematic flowchart of a method 200 for identifying a fingerprint according to an embodiment of the present application. As shown in FIG. 2, the method 200 includes:
  • S210 Control an operation mode of the first fingerprint sensor and the second fingerprint sensor according to a state of the terminal device, where the first fingerprint sensor is built in a screen of the terminal device, and the second fingerprint sensor is located in the terminal. a location other than the screen in the device;
  • S220 Perform fingerprint identification according to an operation mode of the first fingerprint sensor and the second fingerprint sensor.
  • the controlling the working modes of the first fingerprint sensor and the second fingerprint sensor according to the state of the terminal device including:
  • the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
  • controlling, according to a security level of the application or file, a working mode of the first fingerprint sensor and the second fingerprint sensor according to a preset security level threshold include:
  • the first fingerprint sensor When the security level of the application or file does not reach the preset security level threshold, the first fingerprint sensor is controlled to be in an active state, and the second fingerprint sensor is in an inoperative state.
  • the controlling the working modes of the first fingerprint sensor and the second fingerprint sensor according to the state of the terminal device including:
  • the first fingerprint sensor and the second fingerprint sensor are both controlled to be in an inoperative state.
  • performing fingerprint identification according to an operation mode of the first fingerprint sensor and the second fingerprint sensor including:
  • the first fingerprint sensor When the first fingerprint sensor is in an inoperative state and the second fingerprint sensor is in an active state, acquiring fingerprint information of the user by using the second fingerprint sensor to perform fingerprint identification on the fingerprint information; or
  • the first fingerprint sensor When the first fingerprint sensor is in an active state and the second fingerprint sensor is in an inoperative state, acquiring fingerprint information of the user by using the first fingerprint sensor to perform fingerprint identification on the fingerprint information; or
  • the first fingerprint sensor and the second fingerprint sensor When the first fingerprint sensor and the second fingerprint sensor are in an active state, the first fingerprint sensor and the second fingerprint sensor acquire fingerprint information of the user, and perform fingerprint identification on the fingerprint information.
  • the second fingerprint sensor has lower power consumption than the first fingerprint sensor.
  • the first fingerprint sensor is more secure than the second fingerprint sensor.
  • the second fingerprint sensor and the first fingerprint sensor are in the same plane or different planes.
  • the method 200 may be performed by a processor in a terminal device, which may be the processor 130 shown in FIG. 1.
  • the terminal device may further include a memory, and the memory may be used for Storing a program, instruction or code, the processor can execute a program, instruction or code stored in the memory such that the terminal device can execute the corresponding content in method 200.
  • the content of the method disclosed in the embodiment of the present application may be directly implemented by a hardware processor, or may be implemented by using a combination of hardware and software modules in a processor, or by using a software module.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in a memory of the terminal device, and the processor in the terminal device can read information in the memory to complete the content of the foregoing method. To avoid repetition, it will not be described in detail here.
  • the method for recognizing a fingerprint in the embodiment of the present application is described in detail by using the terminal device as a mobile phone as an example, but the embodiment of the present application should not be limited.
  • the first fingerprint sensor included in the mobile phone is located at a specific position of the screen, and the second fingerprint sensor is located at the back of the mobile phone as an example.
  • the present invention should not be limited in any way.
  • the positions of the first fingerprint sensor and the second fingerprint sensor may refer to the foregoing embodiments, and are not described herein for brevity.
  • FIG. 3 is a schematic diagram of the mobile phone in a standby state.
  • the first fingerprint sensor is in an inoperative state
  • the second fingerprint sensor is in an active state. Therefore, as shown in FIG.
  • the second fingerprint sensor performs the screen waking or the bright screen unlocking. Therefore, the second fingerprint sensor is used for fingerprint verification.
  • the installation position of the first fingerprint sensor needs to be displayed on the screen to facilitate guiding. The user presses the fingerprint, resulting in a problem of large power consumption.
  • the first fingerprint sensor is in a working state, and the second fingerprint sensor is in a non-working state.
  • Fingerprint verification by the first fingerprint sensor since the size of the first fingerprint sensor is larger than the size of the second fingerprint sensor, which is equivalent to increasing the length of the password, the security of fingerprint recognition is high.
  • the payment software can control the display of the guiding position on the screen of the mobile phone by accessing a processor in the mobile phone, for example, a software middleware in the processor.
  • the guiding position is a mounting position of the first fingerprint sensor, and the user presses the guiding position, so that the first fingerprint sensor can collect fingerprint information of the user, and after the collection is completed, the fingerprint can be verified. After the verification is passed, Payment can be granted.
  • the size of the sequence numbers of the foregoing processes does not mean the order of execution sequence, and the order of execution of each process should be determined by its function and internal logic, and should not be applied to the embodiment of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including Several instructions are used to make a computer device (which can be a personal computer, a server, Either a network device or the like) performs all or part of the steps of the method described in the various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Image Input (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本申请公开了一种终端设备和识别指纹的方法,能够根据终端设备的不同状态,使用不同的指纹传感器进行指纹识别,从而能够兼顾指纹验证的安全性和用户体验。该终端设备包括:第一指纹传感器、第二指纹传感器和处理器;所述第一指纹传感器内置于所述终端设备的屏幕内,所述第二指纹传感器位于所述终端设备中除所述屏幕以外的其他位置;所述处理器,用于根据所述终端设备的状态,控制所述第一指纹传感器和第二指纹传感器的工作模式。

Description

终端设备和识别指纹的方法 技术领域
本申请涉及电子设备领域,并且更具体地,涉及一种终端设备和识别指纹的方法。
背景技术
屏内指纹传感器可以内置于手机的屏幕内,不必安装在特定位置,例如,手机的背部,或手机的HOME按键位置。因此,不必拘泥于特定的尺寸,这样在指纹识别过程中,相当于增加了密码的长度,提高了指纹识别的安全性。
但是在手机熄屏需要解锁时,需要在屏内指纹传感器的安放位置显示特定的图标,引导用户进行手指按压,因此增加了手机的功耗。同时,由于屏内指纹技术需要与手机的显示模块和触摸模块配合工作,因此在指纹识别验证的速度不如传统的指纹传感器,因此,用户体验较差。
因此,需要一种终端设备,能够兼顾指纹识别的安全性和用户体验。
发明内容
本申请实施例提供一种终端设备和识别指纹的方法,能够兼顾指纹识别的安全性以及用户体验。
第一方面,提供了一种终端设备,包括:第一指纹传感器、第二指纹传感器和处理器;所述第一指纹传感器内置于所述终端设备的屏幕内,所述第二指纹传感器位于所述终端设备中除所述屏幕以外的其他位置;所述处理器,用于根据所述终端设备的状态,控制所述第一指纹传感器和所述第二指纹传感器的工作模式。
在一些可能的实现方式中,所述处理器具体用于:在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式;或在所述终端设备处于工作状态,并且未接收到用户对应用或 文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
在一些可能的实现方式中,所述处理器具体用于:所述处理器具体用于:
在所述应用或文件的安全级别达到所述预设的安全级别门限的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于工作状态;或
在所述应用或文件的安全级别未达到所述预设的安全级别门限的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态。
在一些可能的实现方式中,所述处理器具体用于:在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态;或在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
在一些可能的实现方式中,所述处理器还用于:在所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态的情况下,通过所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或在所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态的情况下,通过所述第一指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或在所述第一指纹传感器和所述第二指纹传感器都处于工作状态时,通过所述第一指纹传感器和所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别。
在一些可能的实现方式中,所述第二指纹传感器比所述第一指纹传感器的功耗低。
在一些可能的实现方式中,所述第一指纹传感器比所述第二指纹传感器的安全性高。
在一些可能的实现方式中,所述第二指纹传感器与所述第一指纹传感器 处于同一平面或不同平面。
第二方面,提供了一种识别指纹的方法,包括:根据终端设备的状态,控制第一指纹传感器和第二指纹传感器的工作模式,其中,所述第一指纹传感器内置于所述终端设备的屏幕内,所述第二指纹传感器位于所述终端设备中除所述屏幕以外的其他位置;根据所述第一指纹传感器和所述第二指纹传感器的工作模式,进行指纹识别。
在一些可能的实现方式中,所述根据终端设备的状态,控制所述第一指纹传感器和第二指纹传感器的工作模式,包括:在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式;或在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
在一些可能的实现方式中,所述根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式,包括:在所述应用或文件的安全级别达到所述预设的安全级别门限的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于工作状态;或在所述应用或文件的安全级别未达到所述预设的安全级别门限的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态。
在一些可能的实现方式中,所述根据终端设备的状态,控制所述第一指纹传感器和第二指纹传感器的工作模式,包括:在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态;或在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或在所述终端设备处于关机状态的 情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
在一些可能的实现方式中,所述根据所述第一指纹传感器和所述第二指纹传感器的工作模式,进行指纹识别,包括:在所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态的情况下,通过所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或在所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态的情况下,通过所述第一指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或在所述第一指纹传感器和所述第二指纹传感器都处于工作状态时,通过所述第一指纹传感器和所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别。
在一些可能的实现方式中,所述第二指纹传感器比所述第一指纹传感器的功耗低。
在一些可能的实现方式中,所述第一指纹传感器比所述第二指纹传感器的安全性高。
在一些可能的实现方式中,所述第二指纹传感器与所述第一指纹传感器处于同一平面或不同平面。
第三方面,提供一种终端设备,包括存储器和处理器,所述存储器用于存储程序,所述处理器用于执行程序,当所述程序被执行时,所述处理器用于执行第二方面中的方法。
第四方面,提供一种计算机可读介质,所述计算机可读介质存储用于终端设备执行的程序代码,所述程序代码包括用于执行第二方面中的方法的指令。
附图说明
图1是根据本申请一实施例的终端设备的示意性框图。
图2是根据本申请实施例的识别指纹的方法的示意性流程图。
图3是手机在待机状态时的示意图。
图4是通过第二指纹传感器进行熄屏唤醒或亮屏解锁的示意图。
图5是通过第一指纹传感器进行支付类指纹验证的示意图。
具体实施方式
下面结合附图,对本申请实施例进行描述。
图1是根据本申请实施例的终端设备100的示意性框图,如图1所示,所述终端设备100可以包括:
第一指纹传感器110、第二指纹传感器120和处理器130;
所述第一指纹传感器110内置于所述终端设备100的屏幕内,所述第二指纹传感器120位于所述终端设备中除所述屏幕以外的其他位置;
所述处理器130,用于根据所述终端设备的状态,控制所述第一指纹传感器和第二指纹传感器的工作模式。
在本申请实施例中,所述第一指纹传感器110内置于所述终端设备的屏幕内,所述第一指纹传感器110的有效检测范围可以与所述终端设备的屏幕大小相同,即整个屏幕的有效显示区域都可以进行指纹验证;或者,所述第一指纹传感器110也可以安装在屏幕内的特定位置,这样进行指纹验证时,需要用户触摸该特定位置,此情况下,进行指纹验证时可以在屏幕上显示用于指示所述第一指纹传感器110安装位置或者有效监测范围的引导图标,以便于引导用户进行指纹按压,本申请实施例对于所述第一指纹传感器110的尺寸不做限定。
作为一种优选的实施例,所述第一指纹传感器110可以采用光学指纹传感器;比如,所述终端设备的屏幕可以为有机发光二极管(Organic Light-Emitting Diode,OLED)屏幕或者其他自发光的显示装置,其具有多个阵列式分布的自发光像素单元,所述光学指纹传感器可以采用所述屏幕的至少部分自发光像素单元作为光源来实现光学式指纹检测;具体地,所述光源发出的光线可以在按压所述屏幕的手指的发生反射,由于指纹的纹峰和纹谷所对应的光路不同,因此通过检测反射光便可以得到手指指纹的纹峰和纹谷所在的位置,即得到指纹图像。可替代地,所述光学指纹传感器本身也可以包括光源,并利用自身光源来实现光学式的指纹检测,在这种情况下所述屏幕可以采用非自发光的显示装置,比如采用背光的液晶显示装置等。作为替代的实施例,所述第一指纹传感器110也可以是设置在所述屏幕下方并位于其显示区域内的电容式指纹传感器或者超声波指纹传感器等。
在本申请实施例中,所述第二指纹传感器120可以为采用其他指纹技术的传感器,例如,电容指纹传感器、超声波指纹传感器,也可以跟第一指纹 传感器120均采用光学指纹传感器等;另外,所述第二指纹传感器120既可以是按压式指纹传感器也可以是滑动式指纹传感器,本申请对此也不做限制。所述第二指纹传感器120可以与所述第一指纹传感器110处于同一平面,具体的,所述第二指纹传感器120可以位于所述终端设备的屏幕的周围,例如,Home键位置,或者,所述第二指纹传感器120也可以与所述第一指纹传感器处于不同平面,例如,所述第二指纹传感器120可以位于所述终端设备的背面,本申请实施例对所述第二指纹传感器的位置不作限定。
在本申请实施例中,所述处理器130可以根据终端设备的状态,确定第一指纹传感器和第二指纹传感器的工作模式,作为示例而非限定,所述终端设备的状态可以包括关机状态、待机状态,工作状态(或者也可以称为解锁状态)。进一步的,待机状态可以包括开机熄屏状态和亮屏未解锁状态。工作状态可以包括亮屏解锁状态但未接收到用户对应用或文件的访问请求(即已解锁但用户未操作应用或文件),以及接收到用户对应用或文件的访问请求(即已解锁并且用户操作了应用或文件)。所述第一指纹传感器和第二指纹传感器的工作模式可以包括:(1)所述第一指纹传感器处于工作状态,而所述第二指纹传感器处于不工作状态;(2)所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;(3)所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或者,(4)所述第一指纹传感器和所述第二指纹传感器都处于工作状态。
应理解,当指纹传感器处于工作状态时,手指触摸指纹传感器,指纹传感器可以采集指纹信息;当指纹传感器处于不工作状态时,即使手指触摸指纹传感器,指纹传感器也不采集指纹信息,因此,指纹传感器处于不工作状态时,能够降低功耗。
可选地,不工作状态可以包括休眠状态和断电状态,其中,指纹传感器处于休眠状态时,供电电源依然开启,但是指纹传感器未被唤醒,因此,不能采集指纹,断电状态时,指纹传感器的供电电源关闭,因此,断电状态时不能采集指纹。
可选的,在一些实施例中,所述处理器130具体用于:
在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或
在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请 求的情况下,根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式;或
在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或
在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
具体的,所述处理器可以在所述终端设备处于关机状态时,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态,因此可以降低终端设备的功耗;或者在所述终端设备处于待机状态,或者说屏幕未解锁时,控制所述第二指纹传感器处于工作状态,所述第一指纹传感器处于不工作状态,由于所述第二指纹传感器比所述第一指纹传感器的功耗低,因此,在待机状态时通过所述第二指纹传感器进行指纹验证比通过所述第一指纹传感器进行指纹验证的功耗低,并且在待机状态时,不必在屏幕显示所述第一指纹传感器的安装位置以便引导用户进行按压,因此,能够进一步降低功耗。
从另一方面来讲,由于采用第一指纹传感器进行验证,需要和显示模块和触摸模块进行配合,指纹验证速度较慢,而通过所述第二指纹传感器进行指纹验证,加快了解锁速度,从而提高了用户体验。退一步讲,屏幕解锁对安全性的要求相对较低,因此,综合考虑安全性和用户体验,在屏幕解锁时,可以采用第二指纹传感器进行指纹验证,从而提升用户体验。
也就是说,在所述终端设备处于关机状态时,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。在所述终端设备处于待机状态时,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态,可选地,所述第二指纹传感器可以定时从休眠状态唤醒,检测是否有指纹按压。如果有,则唤醒处理器,进行指纹匹配,匹配通过时,解锁终端设备,终端设备进入工作状态。
可选地,在终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,所述处理器可以根据访问请求访问的文件或应用的安全级别,跟预设的安全级别门限的关系,确定所述第一指纹传感器和所述第二指纹传感器的工作模式。可选地,所述处理器可以在所述文件或用于的安全级别达到预设的安全级别门限的情况下,控制所述第一指纹传感器和所述第二 指纹传感器都处于工作状态,在未达到安全级别门限的情况下,控制只启动第一指纹传感器。也就是说,在终端解锁后,并未接收到用户对应用或文件的访问请求时,所述处理器可以控制第二指纹传感器处于不工作状态,第一指纹传感器也处于不工作状态;或在接收到用户对应用或文件的访问请求的情况下,所述处理器可以根据应用或文件的安全级别确定是开启第一指纹传感器还是开启第一指纹传感器和第二指纹传感器。可选地,当用户想访问安全级别大于预设的安全级别门限的软件或文件,例如,支付类应用,或公司的机密文件等时,所述处理器可以控制所述第一指纹传感器和所述第二指纹传感器都处于工作状态,具体的,所述处理器可以先控制启动第一指纹传感器,再启动所述第二指纹传感器,或者也可以先启动所述第二指纹传感器,再启动所述第一指纹传感器,或者也可以同时启动所述第一指纹传感器和所述第二指纹传感器,由用户确定先在哪个指纹传感器上输入指纹信息。
以下,以所述处理器先启动所述第二指纹传感器为例进行介绍如何进行指纹验证,所述处理器先启动所述第二指纹传感器,具体的,所述处理器可以控制在终端设备的屏幕显示提示信息,所述提示信息用于提示用户在所述第二指纹传感器上输入指纹,当所述第二指纹传感器验证通过的情况下,再控制启动第一指纹传感器,进行手指按压引导,提示用户在所述第一指纹传感器的位置输入指纹,当第一传感器和第二传感器同时验证通过时,验证通过,因此,本申请实施例还可以控制在访问安全级别高于预设的安全级别门限的文件或应用时,控制通过所述第一指纹传感器和所述第二指纹传感器进行验证,在两个指纹传感器都验证通过的情况下,才能确定验证通过,因此,进一步提高了指纹验证的安全性。
可选地,在一些实施例中,还可以预设另一个安全级别门限,所述另一个安全级别门限低于前述的安全级别门限,所述处理器可以在应用或文件的安全级别低于所述另一安全级别门限的情况下,控制所述第二指纹传感器处于工作状态,所述第一指纹传感器处于不工作状态,即通过第二指纹传感器进行指纹验证,因此,本申请实施例可以在用户访问低安全级别门限的应用或文件时,采用第二指纹传感器进行指纹验证,因此,加快解锁速度,提升了用户体验。
可选地,在一些实施例中,所述处理器具体用于:在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指 纹传感器处于工作状态;或在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态;或在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
跟前述实施例不同的是,所述处理器在接收到用户对应用或文件的访问请求的情况下,可以不进行应用或文件的安全级别的判断,直接设置所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态,即通过所述第一指纹传感器进行指纹验证。
可选的,在一些实施例中,所述处理器还用于:
根据所述第一指纹传感器和所述第二指纹传感器的工作模式,进行指纹识别。
具体的,在所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态的情况下,通过所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
在所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态的情况下,通过所述第一指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
在所述第一指纹传感器和所述第二指纹传感器都处于工作状态时,通过所述第一指纹传感器和所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别。
可选地,在本申请实施例中,所述处理器130所执行的功能可以直接体现为由硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成,或者也可以由软件模块来执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。所述存储介质可以位于所述终端设备的存储器中,所述处理器130可以通过运行存储在存储器中的软件程序或模块,从而执行所述终端设备中的各种功能应用或数据处理,存储器可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需 的应用程序(比如声音播放功能、图象播放功能等)等;存储数据区可存储根据终端设备100的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
可选地,所述终端设备可以为手机、平板电脑等,本申请实施例对此不作限定。
可选地,在本申请实施例中,所述第一指纹传感器比所述第二指纹传感器的安全性高,所述第二指纹传感器比所述第一指纹传感器的功耗低。
因此,本申请实施的终端设备,可以包括两个指纹传感器,即第一指纹传感器和第二指纹传感器,其中,第一指纹传感器的安全性比所述第二指纹传感器的安全性高,第二指纹传感器的功耗比第一指纹传感器的功耗低,从而在终端设备处于待机状态时,使用功耗较小的第二指纹传感器进行解锁,加快了解锁速度,提升了用户体验,在手机支付等安全性要求比较高的场合,使用安全性较高的第一指纹传感器,或第一指纹传感器和第二指纹传感器进行指纹验证,提高了指纹验证的安全性,因此,能够兼顾指纹验证的安全性和用户体验。
作为另一种优选的实施例,考虑到不同用户的指纹可能具有不同的特性,所述终端设备的第一指纹传感器110和第二指纹传感器120可以分别采用不同类型的指纹传感器,比如所述第一指纹传感器110采用光学式指纹传感器,而所述第二指纹传感器120采用电容式指纹传感器。采用上述配置方式的其中一个优点在于,有些用户的指纹特性导致其更容易被电容式指纹传感器识别,而有些用户的指纹特性导致其更容易被光学式指纹传感器识别,因此所述终端设备可以适用于不同使用者的指纹特性,从而有效提高用户体验。采用上述配置方式的另一个优点在于,不同类型的指纹传感器各有优势,比如光学式指纹传感器在湿手指或手指带有灰尘时仍可以较为有效准确地进行指纹识别,而且还可以实现活体检测;而电容式指纹传感器的指纹识别效率更高,指纹解锁时间更短。因此,当用户在不同应用场景下可以选择所述第一指纹传感器110和所述第二指纹传感器120其中之一来进行指纹识别,从而满足不同场景的应用需求。
上文结合图1,详细描述了本申请的装置实施例,下文结合图2至图5,详细描述本申请的方法实施例,应理解,方法实施例与装置实施例相互对应, 类似的描述可以参照装置实施例。
图2是根据本申请实施例的识别指纹的方法200的示意性流程图,如图2所示,该方法200包括:
S210,根据终端设备的状态,控制第一指纹传感器和第二指纹传感器的工作模式,其中,所述第一指纹传感器内置于所述终端设备的屏幕内,所述第二指纹传感器位于所述终端设备中除所述屏幕以外的其他位置;
S220,根据所述第一指纹传感器和所述第二指纹传感器的工作模式,进行指纹识别。
可选的,在一些实施例中,所述根据终端设备的状态,控制所述第一指纹传感器和第二指纹传感器的工作模式,包括:
在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或
在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式;或
在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或
在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
可选的,在一些实施例中,所述根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式,包括:
在所述应用或文件的安全级别达到预设的安全级别门限的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于工作状态;或
在所述应用或文件的安全级别未达到预设的安全级别门限的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态。
可选的,在一些实施例中,所述根据终端设备的状态,控制所述第一指纹传感器和第二指纹传感器的工作模式,包括:
在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于 不工作状态,所述第二指纹传感器处于工作状态;或
在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态;或
在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或
在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
可选的,在一些实施例中,所述根据所述第一指纹传感器和所述第二指纹传感器的工作模式,进行指纹识别,包括:。
在所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态的情况下,通过所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
在所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态的情况下,通过所述第一指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
在所述第一指纹传感器和所述第二指纹传感器都处于工作状态时,通过所述第一指纹传感器和所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别。
可选的,在一些实施例中,所述第二指纹传感器比所述第一指纹传感器的功耗低。
可选的,在一些实施例中,所述第一指纹传感器比所述第二指纹传感器的安全性高。
可选的,在一些实施例中,所述第二指纹传感器与所述第一指纹传感器处于同一平面或不同平面。
应理解,该方法200可以由终端设备中的处理器执行,所述处理器可以为图1所示的处理器130,可选地,所述终端设备还可以包括存储器,所述存储器可以用于存储程序、指令或代码,所述处理器可以执行存储在所述存储器中的程序、指令或代码,使得所述终端设备可以执行方法200中的相应内容。
具体的,本申请实施例所公开的方法的内容可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合,或者用软件模块执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。所述存储介质位于终端设备的存储器中,终端设备中的处理器可以读取存储器中的信息,完成上述方法的内容。为避免重复,这里不再详细描述。
以下,以所述终端设备为手机为例,详细介绍本申请实施例的识别指纹的方法,但不应对本申请实施例构成限定。
应理解,为便于描述,以手机中包括的所述第一指纹传感器位于屏幕的特定位置,所述第二指纹传感器位于手机的背部为例进行介绍,但不应对本申请实施例构成任何限定,在本申请实施例中,所述第一指纹传感器和所述第二指纹传感器的位置可以参考前述实施例,为了简洁,这里不再赘述。
图3所示为在手机在待机状态时的示意图,此情况下,所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态,因此,如图4所示,可以通过触摸第二指纹传感器进行熄屏唤醒或亮屏解锁,因此,避免了采用第二指纹传感器进行指纹验证,在待机状态时,仍然需要在屏幕上显示所述第一指纹传感器的安装位置,以便于引导用户进行指纹按压,导致功耗较大的问题。
可选地,在手机解锁后,在用户需要操作手机支付等安全性要求较高的软件时,所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态,此时,可以通过第一指纹传感器进行指纹验证,由于第一指纹传感器的尺寸相对第二指纹传感器的尺寸较大,相当于增加了密码的长度,因此,指纹识别的安全性较高。具体的,如图5所示,用户操作支付软件时,所述支付软件可以通过访问手机中的处理器,例如,处理器中的软件中间件,控制在所述手机的屏幕上显示引导位置,所述引导位置为所述第一指纹传感器的安装位置,用户按压所述引导位置,从而所述第一指纹传感器可以采集用户的指纹信息,采集完成后,可以对指纹进行验证,验证通过后,可以准许支付。
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后 关联对象是一种“或”的关系。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器, 或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (16)

  1. 一种终端设备,其特征在于,包括:
    第一指纹传感器、第二指纹传感器和处理器;
    所述第一指纹传感器内置于所述终端设备的屏幕内,所述第二指纹传感器位于所述终端设备中除所述屏幕以外的其他位置;
    所述处理器,用于根据所述终端设备的状态,控制所述第一指纹传感器和所述第二指纹传感器的工作模式。
  2. 根据权利要求1所述的终端设备,其特征在于,所述处理器具体用于:
    在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或
    在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式;或
    在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或
    在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
  3. 根据权利要求2所述的终端设备,其特征在于,所述处理器具体用于:
    在所述应用或文件的安全级别达到预设的安全级别门限的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于工作状态;或
    在所述应用或文件的安全级别未达到预设的安全级别门限的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态。
  4. 根据权利要求1所述的终端设备,其特征在于,所述处理器具体用于:
    在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或
    在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请 求的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态;或
    在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或
    在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
  5. 根据权利要求1至4中任一项所述的终端设备,其特征在于,所述处理器还用于:
    在所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态的情况下,通过所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
    在所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态的情况下,通过所述第一指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
    在所述第一指纹传感器和所述第二指纹传感器都处于工作状态时,通过所述第一指纹传感器和所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别。
  6. 根据权利要求1至5中任一项所述的终端设备,其特征在于,所述第二指纹传感器比所述第一指纹传感器的功耗低。
  7. 根据权利要求1至6中任一项所述的终端设备,其特征在于,所述第一指纹传感器比所述第二指纹传感器的安全性高。
  8. 根据权利要求1至7中任一项所述的终端设备,其特征在于,所述第二指纹传感器与所述第一指纹传感器处于同一平面或不同平面。
  9. 一种识别指纹的方法,其特征在于,包括:
    根据终端设备的状态,控制第一指纹传感器和第二指纹传感器的工作模式,其中,所述第一指纹传感器内置于所述终端设备的屏幕内,所述第二指纹传感器位于所述终端设备中除所述屏幕以外的其他位置;
    根据所述第一指纹传感器和所示第二指纹传感器的工作模式,进行指纹识别。
  10. 根据权利要求9所述的方法,其特征在于,所述根据终端设备的状 态,控制第一指纹传感器和第二指纹传感器的工作模式,包括:
    在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或
    在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式;或
    在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或
    在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
  11. 根据权利要求10所述的方法,其特征在于,所述根据所述应用或文件的安全级别,跟预设的安全级别门限的关系,控制所述第一指纹传感器和所述第二指纹传感器的工作模式,包括:
    在所述应用或文件的安全级别达到预设的安全级别门限的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于工作状态;或
    在所述应用或文件的安全级别未达到预设的安全级别门限的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态。
  12. 根据权利要求9所述的方法,其特征在于,所述根据终端设备的状态,控制所述第一指纹传感器和第二指纹传感器的工作模式,包括:
    在所述终端设备处于待机状态的情况下,控制所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态;或
    在所述终端设备处于工作状态,并且接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态;或
    在所述终端设备处于工作状态,并且未接收到用户对应用或文件的访问请求的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态;或
    在所述终端设备处于关机状态的情况下,控制所述第一指纹传感器和所述第二指纹传感器都处于不工作状态。
  13. 根据权利要求9至12中任一项所述的方法,其特征在于,所述根据所述第一指纹传感器和所示第二指纹传感器的工作模式,进行指纹识别,包括:
    在所述第一指纹传感器处于不工作状态,所述第二指纹传感器处于工作状态的情况下,通过所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
    在所述第一指纹传感器处于工作状态,所述第二指纹传感器处于不工作状态的情况下,通过所述第一指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别;或
    在所述第一指纹传感器和所述第二指纹传感器都处于工作状态时,通过所述第一指纹传感器和所述第二指纹传感器获取用户的指纹信息,对所述指纹信息进行指纹识别。
  14. 根据权利要求9至13中任一项所述的方法,其特征在于,所述第二指纹传感器比所述第一指纹传感器的功耗低。
  15. 根据权利要求9至14中任一项所述的方法,其特征在于,所述第一指纹传感器比所述第二指纹传感器的安全性高。
  16. 根据权利要求9至15中任一项所述的方法,其特征在于,所述第二指纹传感器与所述第一指纹传感器处于同一平面或不同平面。
PCT/CN2017/076950 2017-03-16 2017-03-16 终端设备和识别指纹的方法 WO2018165942A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/076950 WO2018165942A1 (zh) 2017-03-16 2017-03-16 终端设备和识别指纹的方法
CN201780000515.3A CN107113349B (zh) 2017-03-16 2017-03-16 终端设备和识别指纹的方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076950 WO2018165942A1 (zh) 2017-03-16 2017-03-16 终端设备和识别指纹的方法

Publications (1)

Publication Number Publication Date
WO2018165942A1 true WO2018165942A1 (zh) 2018-09-20

Family

ID=59664554

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076950 WO2018165942A1 (zh) 2017-03-16 2017-03-16 终端设备和识别指纹的方法

Country Status (2)

Country Link
CN (1) CN107113349B (zh)
WO (1) WO2018165942A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107113349B (zh) * 2017-03-16 2019-01-18 深圳市汇顶科技股份有限公司 终端设备和识别指纹的方法
CN107742074A (zh) * 2017-11-10 2018-02-27 广东小天才科技有限公司 一种指纹解锁方法、装置及设备
CN108200228B (zh) * 2017-11-28 2020-07-31 努比亚技术有限公司 终端指纹识别模组管理方法、终端及计算机可读存储介质
CN111417955B (zh) * 2018-03-26 2023-03-28 华为技术有限公司 一种指纹验证的方法及电子设备
CN109086582B (zh) * 2018-06-15 2022-12-13 华云数智科技(深圳)有限公司 一种指纹认证方法、终端及计算机可读存储介质
CN109359453B (zh) * 2018-09-04 2021-08-24 Oppo(重庆)智能科技有限公司 解锁方法及相关产品
WO2020061759A1 (zh) * 2018-09-25 2020-04-02 深圳市汇顶科技股份有限公司 基于多传感器的屏下指纹采集方法、系统和电子设备
CN109508522B (zh) * 2018-11-16 2022-03-18 Oppo广东移动通信有限公司 一种数据清除方法、装置、存储介质及终端
CN117715031B (zh) * 2023-05-29 2024-11-22 荣耀终端有限公司 一种保护指纹信息的方法及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156709A (zh) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 指纹识别检测组件、终端设备及指纹验证方法
CN204066116U (zh) * 2014-05-09 2014-12-31 敦泰科技有限公司 具有指纹感测功能的电子设备及其驱动电路
CN105184228A (zh) * 2015-08-13 2015-12-23 小米科技有限责任公司 移动设备及其屏幕模组、指纹采集方法、装置及电子设备
CN107113349A (zh) * 2017-03-16 2017-08-29 深圳市汇顶科技股份有限公司 终端设备和识别指纹的方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102158211B1 (ko) * 2013-10-18 2020-09-22 엘지전자 주식회사 이동 단말기 및 이의 제어 방법
CN106295477A (zh) * 2015-06-03 2017-01-04 小米科技有限责任公司 一种进行指纹识别的终端
CN205942699U (zh) * 2016-06-23 2017-02-08 深圳市恒盛通科技有限公司 一种带有指纹识别模块的移动终端
CN205942700U (zh) * 2016-07-06 2017-02-08 成都锐成芯微科技有限责任公司 移动终端指纹识别系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204066116U (zh) * 2014-05-09 2014-12-31 敦泰科技有限公司 具有指纹感测功能的电子设备及其驱动电路
CN104156709A (zh) * 2014-08-26 2014-11-19 南昌欧菲生物识别技术有限公司 指纹识别检测组件、终端设备及指纹验证方法
CN105184228A (zh) * 2015-08-13 2015-12-23 小米科技有限责任公司 移动设备及其屏幕模组、指纹采集方法、装置及电子设备
CN107113349A (zh) * 2017-03-16 2017-08-29 深圳市汇顶科技股份有限公司 终端设备和识别指纹的方法

Also Published As

Publication number Publication date
CN107113349A (zh) 2017-08-29
CN107113349B (zh) 2019-01-18

Similar Documents

Publication Publication Date Title
WO2018165942A1 (zh) 终端设备和识别指纹的方法
US11698792B2 (en) Method for starting up device and device
US10728442B2 (en) Initializing camera subsystem for face detection based on sensor inputs
US9665762B2 (en) Tiered wakeup strategy
CN107765774B (zh) 待机状态下基于指纹识别的终端登录方法、系统
US9396380B2 (en) Finger print sensor and auxiliary processor integration in an electronic device
US20140189604A1 (en) Method and system for unlocking a touchscreen of an electronic device
CN107223254B (zh) 用于隐藏设置处理的方法、用户装置和存储介质
CN106485124B (zh) 一种移动终端的操作控制方法及移动终端
EP3526959B1 (en) Method of acquiring biometric data and electronic device therefor
US20140002240A1 (en) Expedited Biometric Validation
CN107450839B (zh) 基于黑屏手势的控制方法、装置、存储介质及移动终端
CN108292336B (zh) 一种指纹采集方法及终端
WO2019101096A1 (zh) 安全验证的方法、装置及移动终端
CN107422860B (zh) 基于黑屏手势的控制方法、装置、存储介质及移动终端
CN101271500A (zh) 生物识别启动装置及方法
WO2020098412A1 (zh) 一种数据清除方法、装置、存储介质及终端
CN107422976A (zh) 基于黑屏手势的控制方法、装置、存储介质及移动终端
CN106250747B (zh) 一种信息处理方法及电子设备
JP2019008527A (ja) 情報処理装置、生体認証制御方法、及び生体認証制御プログラム
WO2019134116A1 (zh) 用户接口交互的方法和终端设备
US9824219B2 (en) Electronic device having wake up verification and electronic system having the electronic device
CN110457075B (zh) 通信终端的关机方法及装置、存储介质、通信终端
TWI430133B (zh) 生物感測啟動裝置、生物特徵感測控制之啟動管理系統及其方法
TW201702797A (zh) 電子裝置及其啟動方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17900890

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17900890

Country of ref document: EP

Kind code of ref document: A1