User verification method and device and electronic device

A user verification and electronic device technology, applied in the field of identity verification, can solve the problems of fuzzy fingerprints, biometric fingerprints are easily stolen and forged, and fingerprint identification is difficult to achieve the effect of improving security.

Active Publication Date: 2015-04-29
SHENZHEN TENCENT COMP SYST CO LTD
View PDF3 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the existing fingerprint recognition technology still has some shortcomings.
For example, because the directions of printing are not exactly the same each time, different points of application will bring different degrees of deformation, and there are a large number of fuzzy fingerprints, which makes fingerprint identification difficult.
In addition, due to the development of science and technology, biometric fingerprints are also easy to be stolen and forged. If there is only one layer of identity verification, fingerprint recognition, it is difficult to guarantee the requirements of scenarios with high security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User verification method and device and electronic device
  • User verification method and device and electronic device
  • User verification method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0055] This embodiment provides a user authentication method, which can be used in the above-mentioned electronic device 100 . refer to figure 2 , the above method includes the following steps:

[0056] Setting step S101: Pre-collect and store the user's fingerprint features and gesture trajectory features.

[0057] For example, by collecting the fingerprint features of the user through the fingerprint sensor 114 or the touch screen 110 , the fingerprint features of one or more fingers may be collected. One or more gesture trajectory data of the user can be collected through the touch screen 110, and the trajectory characteristics of the gestures can be recorded.

[0058] Collection step S102: collecting the current user's fingerprint feature and the current gesture track feature when user verification is required.

[0059] The aforementioned occasions when user authentication is required refer to various occasions where user authentication is required, such as when unlock...

no. 2 example

[0064] This embodiment provides a user authentication method, which can be used in the above-mentioned electronic device 100 . The method of this embodiment and figure 2 The method shown is similar, except that, see image 3 , the collection step S102 may specifically include the following steps:

[0065] Step S201 , detecting the touch points of the touch screen.

[0066] refer to Figure 4 , which is a schematic diagram of a finger 20 touching the touch screen 110 , and its contact point is 21 .

[0067] Step S202, continuously collect the position and fingerprint samples corresponding to the touch point during the movement of the touch point.

[0068] see also Figure 4 and Figure 5 , which is a schematic diagram of the contact 21 moving from the initial position to the final position. During this process, the position coordinates of the touch point and fingerprint samples are recorded at intervals (sampling interval). It can be understood that the sampling freque...

no. 3 example

[0083] This embodiment provides a user authentication method, which can be used in the above-mentioned electronic device 100 . The method of this embodiment and image 3 The method shown is similar, except that, see Figure 6 , the verification step S104 includes the following steps:

[0084] Step S301, judging whether the current user's fingerprint feature matches the pre-stored fingerprint feature; if they match, go to step S302; otherwise, the user verification fails.

[0085] Step S302, judging whether the current user's gesture feature matches the pre-stored gesture feature; if they match, go to step S303; otherwise, the user verification fails.

[0086] Step S303, judging whether the fingerprint feature of the current user matches the gesture feature of the current user; if they match, the user verification is passed; otherwise, the user verification is not passed.

[0087] For example, in step S101, fingerprint features of multiple fingers and multiple user gesture f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user verification method, a user verification device and an electronic device. In one embodiment, the method comprises the following steps that fingerprint features of a user and gesture track features are collected and stored in advance; when the user verification is needed, the current user fingerprint features and the current gesture track features are collected; the current user fingerprint features and the current gesture feature track features are compared with the pre-stored fingerprint features and the gesture track features; if the current user fingerprint features are not matched with the pre-stored fingerprint features, or the current gesture track features are not matched with the pre-stored gesture track features, the user verification is not passed. The device, the device and the electronic device have the advantage that the user verification security can be improved.

Description

technical field [0001] The invention relates to identity verification technology, in particular to a user verification method, device and electronic device. Background technique [0002] Fingerprint identification refers to identification by comparing the detailed feature points of different fingerprints. Because everyone's fingerprints are different, even between the ten fingers of the same person, there are obvious differences in fingerprints, so fingerprints can be used for identification. [0003] Fingerprint identification technology is currently the most mature and cheap biometric identification technology. At present, the fingerprint recognition technology is the most widely used. We can not only see the fingerprint recognition technology in the access control and attendance system, but also have more fingerprint recognition applications in the market: such as laptops, mobile phones, cars, bank payments, etc. Fingerprint recognition technology can be applied. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F3/0488
CPCG06F3/04883G06F21/32G06F21/36
Inventor 唐艳平陈梦陈远斌董梁刘飞飞孙增昕陈荣李德春
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products