Movatterモバイル変換


[0]ホーム

URL:


CN113971271A - Fingerprint unlocking method and device, terminal and storage medium - Google Patents

Fingerprint unlocking method and device, terminal and storage medium
Download PDF

Info

Publication number
CN113971271A
CN113971271ACN202010710835.1ACN202010710835ACN113971271ACN 113971271 ACN113971271 ACN 113971271ACN 202010710835 ACN202010710835 ACN 202010710835ACN 113971271 ACN113971271 ACN 113971271A
Authority
CN
China
Prior art keywords
unlocking
state data
fingerprint
false touch
historical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010710835.1A
Other languages
Chinese (zh)
Inventor
吴晓瑜
苗磊
吴都明
路宇龙
刘克楠
刘宏马
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co LtdfiledCriticalHuawei Technologies Co Ltd
Priority to CN202010710835.1ApriorityCriticalpatent/CN113971271A/en
Publication of CN113971271ApublicationCriticalpatent/CN113971271A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

The application is applicable to the technical field of equipment control, and provides a method, a device, a terminal and a storage medium for fingerprint unlocking based on Artificial Intelligence (AI), wherein the method comprises the following steps: if the fingerprint identification area is detected to have pressing operation in the screen locking state, acquiring equipment state data and fingerprint information corresponding to the electronic equipment at the moment of pressing operation; matching the fingerprint information with a standard fingerprint to obtain a fingerprint matching result, and generating a false touch identification result according to unlocking state data and equipment state data recorded in a historical unlocking process; and if the fingerprint matching result is successful in matching and the false touch identification result is false touch operation, maintaining the screen locking state. The method and the device have the advantages that the mistaken touch event is identified, the screen locking state is maintained when the mistaken touch operation is judged, the possibility of the mistaken operation is reduced, and the use experience of a user is improved.

Description

Fingerprint unlocking method and device, terminal and storage medium
Technical Field
The application belongs to the technical field of equipment control, and particularly relates to a fingerprint unlocking method, a fingerprint unlocking device, a fingerprint unlocking terminal and a storage medium.
Background
The fingerprint unlocking technology is widely used in terminal equipment such as mobile phones and tablet computers and becomes an extremely important part of the equipment control technology, and the speed of fingerprint identification and unlocking response is faster and faster along with the continuous improvement of the fingerprint unlocking technology. However, in the existing fingerprint unlocking technology, when a finger with a fingerprint input by a user touches a fingerprint identification area of the terminal device by mistake, the terminal device is unlocked without unlocking intention of the user, so that the possibility of misoperation is increased, and the use experience of the user is reduced.
Disclosure of Invention
The embodiment of the application provides a fingerprint unlocking method, a fingerprint unlocking device, a fingerprint unlocking terminal and a fingerprint unlocking storage medium, and can solve the problems that the existing fingerprint unlocking technology cannot identify a mistaken unlocking event, so that the possibility of misoperation is increased, and the use experience is reduced.
In a first aspect, an embodiment of the present application provides a fingerprint unlocking method, which is applied to an electronic device, and includes:
when the electronic equipment detects that the fingerprint identification area has a pressing operation in a screen locking state, equipment state data and fingerprint information corresponding to the electronic equipment at the moment of the pressing operation are obtained; then, the electronic equipment matches the fingerprint information with a standard fingerprint to obtain a fingerprint matching result corresponding to the fingerprint information, and generates a false touch identification result corresponding to the pressing operation according to unlocking state data recorded in a historical unlocking process and the equipment state data; at the moment, the electronic equipment detects that the fingerprint matching result is successful in matching and the false touch identification result is false touch operation, and then the screen locking state is maintained.
According to the embodiment of the application, when a user presses a fingerprint identification area, fingerprint information is acquired, meanwhile, equipment state data corresponding to the pressing operation moment are acquired, the equipment state data are compared with unlocking state data corresponding to the conventional unlocking process of the user, a false touch identification result is obtained based on the comparison result, the false touch event is identified, when the false touch operation is judged, the screen locking state is maintained, the possibility of false operation is reduced, and the use experience of the user is improved.
In a possible implementation manner of the first aspect, after the obtaining a fingerprint matching result of the fingerprint information and a standard fingerprint, and generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data, the method further includes: and the electronic equipment identifies that the fingerprint matching result is successful in matching and the false touch identification result is non-false touch operation, and then unlocking operation is executed.
In a possible implementation manner of the first aspect, after the executing the unlocking operation if the fingerprint matching result is a successful matching and the false touch identification result is a non-false touch operation, the method further includes: and the electronic equipment generates unlocking state data corresponding to the unlocking operation, wherein the electronic equipment can determine a false touch recognition result of the later-triggered pressing operation through the unlocking state data.
In the embodiment of the application, the corresponding unlocking state data is generated after the unlocking operation is executed, so that the number of sample data in the process of generating the false touch recognition result is enriched, and the accuracy of subsequent false touch recognition can be improved.
In one possible implementation manner of the first aspect, after the generating the unlock state data corresponding to the unlock operation, the method further includes: the electronic equipment can obtain touch operation initiated by a user, and configures an effective identifier corresponding to the unlocking state data based on the touch operation; the electronic equipment can determine the false touch recognition result of the press operation triggered later by selecting the effective unlocking state data and based on the effective unlocking state data.
In a possible implementation manner of the first aspect, after obtaining a touch operation initiated by a user on an electronic device and configuring a valid identifier corresponding to the unlock state data based on the touch operation, the method further includes: and when the electronic equipment identifies that the effective identifier of the unlocking state data is the first bit value, executing screen locking operation.
In one possible implementation manner of the first aspect, the touch operation includes: a slide operation, a click operation, or a long press operation.
In the embodiment of the application, after the electronic equipment is unlocked, intention identification can be carried out on subsequent touch operation of a user, and effective identification configuration is carried out on unlocking state data corresponding to the unlocking operation based on the intention identification, so that the influence of invalid unlocking state data on a false touch identification process can be reduced, and the accuracy of the false touch identification is improved.
In a possible implementation manner of the first aspect, after the obtaining a fingerprint matching result of the fingerprint information and a standard fingerprint, and generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data, the method further includes: when the electronic equipment identifies that the fingerprint matching result is a matching failure, the electronic equipment is maintained in a screen locking state, namely, the electronic equipment is not unlocked.
In a possible implementation manner of the first aspect, the generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data includes: the electronic equipment counts the matching number of unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations; then, determining an unlocking probability based on the matching number, and if the unlocking probability is greater than or equal to a preset unlocking judgment threshold value, generating a false touch identification result of non-false touch operation; otherwise, if the unlocking probability is smaller than the unlocking judgment threshold, generating a false touch recognition result of the false touch operation.
In a possible implementation manner of the first aspect, before counting a matching number of unlocking state data that match the device state data, among the unlocking state data of all historical unlocking operations, the method further includes: the electronic equipment acquires historical pressing time corresponding to historical pressing operation successfully matched with the standard fingerprint, and determines a pressing interval based on the historical pressing time and the pressing operation time; configuring the unlock determination threshold based on the press interval; wherein, the shorter the pressing interval, the smaller the corresponding unlocking determination threshold value.
In the embodiment of the application, the unlocking judgment threshold value is adjusted by determining the pressing interval between the historical pressing operation successfully matched with the fingerprint at the last time and the current moment, so that the occurrence probability that the unlocking cannot be successfully performed due to the fact that the equipment state corresponding to the unlocking operation at this time is inconsistent with the unlocking state obtained by historical acquisition due to the change of the operation habit under the condition that the unlocking intention exists is reduced, and the accuracy of false touch recognition is improved.
In a possible implementation manner of the first aspect, the generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data includes: the electronic equipment leads the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; before importing the device state data into the false touch recognition model, the electronic device may train the false touch recognition model based on the unlocking state data.
In a possible implementation manner of the first aspect, if the fingerprint matching result is a successful matching and the false touch identification result is a false touch operation, maintaining the screen locking state includes: the electronic equipment outputs unlocking prompt information, and can trigger corresponding first touch operation according to the unlocking prompt information under the condition that a user intentionally unlocks, wherein the unlocking prompt information can prompt the user to click a preset area, prompt the user to draw a specific graph or prompt the user to slide a preset distance in a preset direction; therefore, if the electronic device does not receive the first touch operation matched with the unlocking prompt message within the preset effective response time, the electronic device indicates that the user is unconsciously unlocked, and the electronic device maintains the screen locking state at the moment.
In a possible implementation manner of the first aspect, after the outputting the unlocking prompt information, the method further includes: and if the electronic equipment receives a first touch operation matched with the unlocking prompt message within the effective response time, executing an unlocking operation.
In one possible implementation manner of the first aspect, the device state data collected by the electronic device includes an ambient light intensity value and a placement state of the electronic device; in this case, the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data may specifically be: if the electronic equipment detects that the ambient light intensity value is smaller than a preset light intensity threshold value and the placement state of the electronic equipment is a preset state, for example, the electronic equipment is in a horizontal placement state, the electronic equipment is identified to be in an idle scene, and the false touch identification result of false touch operation is output; the idle scenes comprise an idle scene placed in the pocket and an idle scene placed in the bag, namely the electronic equipment is placed in the bag or the pocket, and at the moment, the user does not consciously control the electronic equipment, so that the unlocking operation can be recognized as mistaken touch unlocking.
In a second aspect, an embodiment of the present application provides a fingerprint unlocking device, including:
the first equipment state data obtaining unit is used for obtaining equipment state data and fingerprint information corresponding to the electronic equipment at the moment of pressing operation if the fact that the pressing operation exists in the fingerprint identification area is detected in the screen locking state;
the unlocking identification unit is used for obtaining a fingerprint matching result of the fingerprint information and a standard fingerprint and generating a false touch identification result according to unlocking state data recorded in a historical unlocking process and the equipment state data;
and the first mistaken touch response unit is used for maintaining the screen locking state if the fingerprint matching result is successful in matching and the mistaken touch identification result is mistaken touch operation.
In one possible implementation manner of the second aspect, the unlock identifying unit includes:
the first matching number counting unit is used for counting the matching number of the unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and the first unlocking probability comparison unit is used for determining the unlocking probability based on the matching number and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
In one possible implementation manner of the second aspect, the fingerprint unlocking apparatus further includes:
a first pressing interval acquisition unit configured to acquire a historical pressing time corresponding to a historical pressing operation for which the standard fingerprint is successfully matched, and determine a pressing interval based on the historical pressing time and the pressing operation time;
a first unlock determination threshold value configuration unit configured to configure the unlock determination threshold value based on the pressing interval.
In one possible implementation manner of the second aspect, the unlock identifying unit includes:
the first false touch recognition model importing unit is used for importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
In a third aspect, an embodiment of the present application provides a fingerprint unlocking method, which is applied to an electronic device, and includes: the method comprises the steps that when the electronic equipment detects that a pressing operation exists in a fingerprint identification area in a screen locking state, equipment state data and fingerprint information corresponding to the electronic equipment at the moment of the pressing operation are obtained; matching the fingerprint information with a standard fingerprint to obtain a fingerprint matching result corresponding to the fingerprint information; then, if the fingerprint matching result is that the matching is successful, generating a false touch identification result corresponding to the pressing operation according to unlocking state data recorded in a historical unlocking process and the equipment state data; and if the false touch recognition result is false touch operation, maintaining the screen locking state.
In the embodiment of the application, the fingerprint identification process is firstly carried out, and the false touch identification operation is executed after the fingerprint matching is successful. Since the response speed of the fingerprint recognition operation is faster and the calculation amount is smaller than that of the false touch recognition operation, the unlock state can be directly maintained when the fingerprint matching fails without performing the false touch recognition operation with a large calculation amount or waiting for the result of the false touch recognition operation, thereby reducing the unnecessary calculation amount.
In a possible implementation manner of the third aspect, after generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data if the fingerprint matching result is a successful match, the method further includes: and the electronic equipment identifies that the false touch identification result is non-false touch operation, and then executes unlocking operation.
In a possible implementation manner of the third aspect, after the executing the unlocking operation if the false touch recognition result is the non-false touch operation, the method further includes: and the electronic equipment generates unlocking state data corresponding to the unlocking operation, wherein the electronic equipment can determine a false touch recognition result of the later-triggered pressing operation through the unlocking state data.
In the embodiment of the application, the corresponding unlocking state data is generated after the unlocking operation is executed, so that the number of sample data in the process of generating the false touch recognition result is enriched, and the accuracy of subsequent false touch recognition can be improved.
In a possible implementation manner of the third aspect, after the generating the unlock state data corresponding to the unlock operation, the method further includes: the electronic equipment obtains touch operation initiated by a user pair, and configures an effective identifier corresponding to the unlocking state data based on the touch operation; the valid identification is used for: the electronic device can select effective unlocking state data, and determine a false touch recognition result of a later-triggered pressing operation based on the effective unlocking state data.
In a possible implementation manner of the third aspect, after obtaining a touch operation initiated by a user on an electronic device and configuring a valid identifier corresponding to the unlock state data based on the touch operation, the method further includes: and when the electronic equipment identifies that the effective identifier of the unlocking state data is the first bit value, executing screen locking operation.
In one possible implementation manner of the third aspect, the touch operation includes: a slide operation, a click operation, or a long press operation.
In the embodiment of the application, after the electronic equipment is unlocked, intention identification can be carried out on subsequent touch operation of a user, and effective identification configuration is carried out on unlocking state data corresponding to the unlocking operation based on the intention identification, so that the influence of invalid unlocking state data on a false touch identification process can be reduced, and the accuracy of the false touch identification is improved.
In a possible implementation manner of the third aspect, after the obtaining of the fingerprint matching result of the fingerprint information and the standard fingerprint, the method further includes: and when the electronic equipment identifies that the fingerprint matching result is a matching failure, the electronic equipment is maintained in the screen locking state, namely, the electronic equipment is not unlocked.
In a possible implementation manner of the third aspect, the generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data includes: the electronic equipment counts the matching number of unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations; then, determining an unlocking probability based on the matching number, and if the unlocking probability is greater than or equal to a preset unlocking judgment threshold value, generating a false touch identification result of non-false touch operation; otherwise, if the unlocking probability is smaller than the unlocking judgment threshold, generating a false touch recognition result of the false touch operation.
In a possible implementation manner of the third aspect, before counting a matching number of the unlocking state data that matches the device state data, among the unlocking state data of all historical unlocking operations, the method further includes: the electronic equipment acquires historical pressing time corresponding to historical pressing operation successfully matched with the standard fingerprint, and determines a pressing interval based on the historical pressing time and the pressing operation time; configuring the unlock determination threshold based on the press interval; wherein, the shorter the pressing interval, the smaller the corresponding unlocking determination threshold value.
In the embodiment of the application, the unlocking judgment threshold value is adjusted by determining the pressing interval between the historical pressing operation successfully matched with the fingerprint at the last time and the current moment, so that the occurrence probability that the unlocking cannot be successfully performed due to the fact that the equipment state corresponding to the unlocking operation at this time is inconsistent with the unlocking state obtained by historical acquisition due to the change of the operation habit under the condition that the unlocking intention exists is reduced, and the accuracy of false touch recognition is improved.
In a possible implementation manner of the third aspect, the generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data includes: the electronic equipment leads the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; before importing the device state data into the false touch recognition model, the electronic device may train the false touch recognition model based on the unlocking state data.
In a possible implementation manner of the third aspect, if the false touch recognition result is a false touch operation, the maintaining the screen locking state includes: the electronic equipment outputs unlocking prompt information, and can trigger corresponding first touch operation according to the unlocking prompt information under the condition that a user intentionally unlocks, wherein the unlocking prompt information can prompt the user to click a preset area, prompt the user to draw a specific graph or prompt the user to slide a preset distance in a preset direction; therefore, if the electronic device does not receive the first touch operation matched with the unlocking prompt message within the preset effective response time, the electronic device indicates that the user is unconsciously unlocked, and the electronic device maintains the screen locking state at the moment.
In a possible implementation manner of the third aspect, after the outputting the unlocking prompt information, the method further includes: and if the electronic equipment receives a first touch operation matched with the unlocking prompt message within the effective response time, executing an unlocking operation.
In a possible implementation manner of the third aspect, the device state data collected by the electronic device includes an ambient light intensity value and a placement state of the electronic device; in this case, the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data may specifically be: if the electronic equipment detects that the ambient light intensity value is smaller than a preset light intensity threshold value and the placement state of the electronic equipment is a preset state, for example, the electronic equipment is in a horizontal placement state, the electronic equipment is identified to be in an idle scene, and the false touch identification result of false touch operation is output; the idle scenes comprise an idle scene placed in the pocket and an idle scene placed in the bag, namely the electronic equipment is placed in the bag or the pocket, and at the moment, the user does not consciously control the electronic equipment, so that the unlocking operation can be recognized as mistaken touch unlocking.
In a fourth aspect, an embodiment of the present application provides a fingerprint unlocking device, including:
the second equipment state data obtaining unit is used for obtaining equipment state data and fingerprint information corresponding to the electronic equipment at the moment of pressing operation if the fact that the pressing operation exists in the fingerprint identification area is detected in the screen locking state;
the first fingerprint identification unit is used for obtaining a fingerprint matching result of the fingerprint information and a standard fingerprint;
the first false touch recognition unit is used for generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the equipment state data if the fingerprint matching result is that the matching is successful;
and the second false touch response unit is used for maintaining the screen locking state if the false touch identification result is false touch operation.
In one possible implementation manner of the fourth aspect, the first false touch recognition unit includes:
the second matching number counting unit is used for counting the matching number of the unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and the second unlocking probability comparison unit is used for determining the unlocking probability based on the matching number and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
In one possible implementation manner of the fourth aspect, the fingerprint unlocking apparatus further includes:
a second pressing interval acquisition unit configured to acquire a history pressing time corresponding to a history pressing operation for which the standard fingerprint is successfully matched, and determine a pressing interval based on the history pressing time and the pressing operation time;
a second unlocking determination threshold value configuration unit configured to configure the unlocking determination threshold value based on the pressing interval.
In one possible implementation manner of the fourth aspect, the first false touch recognition unit includes:
the second false touch recognition model importing unit is used for importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
In a fifth aspect, an embodiment of the present application provides a fingerprint unlocking method, which is applied to an electronic device, and includes: if the electronic equipment detects that a pressing operation exists in a fingerprint identification area in a screen locking state, equipment state data and fingerprint information corresponding to the electronic equipment at the moment of the pressing operation are obtained; generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the equipment state data; and if the false touch recognition result is false touch operation, maintaining the screen locking state.
According to the embodiment of the application, the mistaken touch identification operation is firstly carried out, the fingerprint identification process is executed after the mistaken touch operation is judged to be not mistaken, the fingerprint identification and the mistaken touch identification are not required to be executed for any pressing operation, so that the unnecessary fingerprint identification operation is reduced, and the resource consumption in the unlocking process is reduced.
In a possible implementation manner of the fifth aspect, after generating a false touch recognition result according to the unlocking state data and the device state data recorded in the historical unlocking process, the method further includes: when the electronic equipment identifies that the false touch identification result is non-false touch operation, matching the fingerprint information with a standard fingerprint to obtain a fingerprint matching result corresponding to the fingerprint information; and if the fingerprint matching result is that the matching is successful, executing unlocking operation.
In a possible implementation manner of the fifth aspect, after the performing an unlocking operation if the fingerprint matching result is a successful matching, the method further includes: and the electronic equipment generates unlocking state data corresponding to the unlocking operation, wherein the electronic equipment can determine a false touch recognition result of the later-triggered pressing operation through the unlocking state data.
In the embodiment of the application, the corresponding unlocking state data is generated after the unlocking operation is executed, so that the number of sample data in the process of generating the false touch recognition result is enriched, and the accuracy of subsequent false touch recognition can be improved.
In one possible implementation manner of the fifth aspect, after the generating the unlock state data corresponding to the unlock operation, the method further includes: the electronic equipment can obtain touch operation initiated by a user pair, and configures an effective identifier corresponding to the unlocking state data based on the touch operation; the electronic equipment can determine the false touch recognition result of the press operation triggered later by selecting the effective unlocking state data and based on the effective unlocking state data.
In a possible implementation manner of the fifth aspect, after the obtaining a touch operation initiated by a user on an electronic device and configuring a valid identifier corresponding to the unlocking state data based on the touch operation, the method further includes: and when the electronic equipment identifies that the effective identifier of the unlocking state data is the first bit value, executing screen locking operation.
In one possible implementation manner of the first aspect, the touch operation includes: a slide operation, a click operation, or a long press operation.
In the embodiment of the application, after the electronic equipment is unlocked, intention identification can be carried out on subsequent touch operation of a user, and effective identification configuration is carried out on unlocking state data corresponding to the unlocking operation based on the intention identification, so that the influence of invalid unlocking state data on a false touch identification process can be reduced, and the accuracy of the false touch identification is improved.
In a possible implementation manner of the fifth aspect, after obtaining a fingerprint matching result between the fingerprint information and a standard fingerprint if the false touch recognition result is a non-false touch operation, the method further includes: and when the electronic equipment identifies that the fingerprint matching result is a matching failure, maintaining the electronic equipment in the screen locking state, namely, not unlocking the electronic equipment.
In a possible implementation manner of the fifth aspect, before the performing the unlocking operation, the method further includes: the electronic equipment outputs unlocking prompt information, and can trigger corresponding first touch operation according to the unlocking prompt information under the condition that a user intentionally unlocks, wherein the unlocking prompt information can prompt the user to click a preset area, prompt the user to draw a specific graph or prompt the user to slide a preset distance in a preset direction; therefore, if the electronic device does not receive the first touch operation matched with the unlocking prompt message within the preset effective response time, the electronic device indicates that the user is unconsciously unlocked, and the electronic device maintains the screen locking state at the moment.
In a possible implementation manner of the fifth aspect, after the outputting the unlocking prompt information, the method further includes: and if the electronic equipment receives a first touch operation matched with the unlocking prompt message within the effective response time, executing an unlocking operation.
In a possible implementation manner of the fifth aspect, the generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data includes: the electronic equipment counts the matching number of unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations; then, determining an unlocking probability based on the matching number, and if the unlocking probability is greater than or equal to a preset unlocking judgment threshold value, generating the false touch identification result of the non-false touch operation; otherwise, if the unlocking probability is smaller than the unlocking judgment threshold, generating a false touch recognition result of the false touch operation.
In a possible implementation manner of the fifth aspect, before counting the number of matches of the unlocking state data that match the device state data, among the unlocking state data of all historical unlocking operations, the method further includes: the electronic equipment acquires historical pressing time corresponding to historical pressing operation successfully matched with the standard fingerprint, and determines a pressing interval based on the historical pressing time and the pressing operation time; configuring the unlock determination threshold based on the press interval; wherein, the shorter the pressing interval, the smaller the corresponding unlocking determination threshold value.
In the embodiment of the application, the unlocking judgment threshold value is adjusted by determining the pressing interval between the historical pressing operation successfully matched with the fingerprint at the last time and the current moment, so that the occurrence probability that the unlocking cannot be successfully performed due to the fact that the equipment state corresponding to the unlocking operation at this time is inconsistent with the unlocking state obtained by historical acquisition due to the change of the operation habit under the condition that the unlocking intention exists is reduced, and the accuracy of false touch recognition is improved.
In a possible implementation manner of the fifth aspect, the generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data includes: the electronic equipment leads the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the electronic device may be based on the unlock state data before importing the device state data into the false touch recognition model, wherein the electronic device may be trained before importing the device state data into the false touch recognition model.
In a possible implementation manner of the fifth aspect, the device state data collected by the electronic device includes an ambient light intensity value and a placement state of the electronic device; in this case, the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data may specifically be: if the electronic equipment detects that the ambient light intensity value is smaller than a preset light intensity threshold value and the placement state of the electronic equipment is a preset state, for example, the electronic equipment is in a horizontal placement state, the electronic equipment is identified to be in an idle scene, and the false touch identification result of false touch operation is output; the idle scenes comprise an idle scene placed in the pocket and an idle scene placed in the bag, namely the electronic equipment is placed in the bag or the pocket, and at the moment, the user does not consciously control the electronic equipment, so that the unlocking operation can be recognized as mistaken touch unlocking.
In a sixth aspect, an embodiment of the present application provides a fingerprint unlocking device, including:
the third equipment state data obtaining unit is used for obtaining equipment state data and fingerprint information corresponding to the electronic equipment at the moment of pressing operation if the fact that the pressing operation exists in the fingerprint identification area is detected in the screen locking state;
the second false touch recognition unit is used for generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the equipment state data if the fingerprint matching result is that the matching is successful;
and the third false touch response unit is used for maintaining the screen locking state if the false touch identification result is false touch operation.
In one possible implementation manner of the sixth aspect, the second false touch recognition unit includes:
the third matching number counting unit is used for counting the matching number of the unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and the third unlocking probability comparison unit is used for determining the unlocking probability based on the matching number and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
In one possible implementation manner of the sixth aspect, the fingerprint unlocking apparatus further includes:
a third pressing interval acquisition unit configured to acquire a historical pressing time corresponding to a historical pressing operation that the standard fingerprint is successfully matched with, and determine a pressing interval based on the historical pressing time and the pressing operation time;
a third unlocking determination threshold value configuration unit configured to configure the unlocking determination threshold value based on the pressing interval.
In one possible implementation manner of the sixth aspect, the second false touch recognition unit includes:
the third false touch recognition model importing unit is used for importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
In a seventh aspect, an embodiment of the present application provides an electronic device, a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor, when executing the computer program, implements the method for unlocking a fingerprint according to any one of the above first aspects.
In an eighth aspect, the present application provides a computer-readable storage medium, where a computer program is stored, where the computer program is implemented, when executed by a processor, to implement the method for unlocking a fingerprint according to any one of the above first aspects.
In a ninth aspect, the present application provides a computer program product, which when run on an electronic device, causes the electronic device to execute the method for unlocking a fingerprint according to any one of the above first aspects.
It is understood that the beneficial effects of the second to ninth aspects can be seen from the description of the first aspect, and are not repeated herein.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a block diagram of a partial structure of an electronic device provided in an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an off-screen fingerprint identification module according to an embodiment of the present application;
fig. 3 is a block diagram of a software structure of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic view of a scenario in which a smart phone provided in an embodiment of the present application is placed in a bag;
fig. 5 is a schematic view of a scenario of a smart phone provided in an embodiment of the present application in a certain holding state of a user;
fig. 6 is a schematic view of a scenario of a smart phone provided in an embodiment of the present application in a state where a user intends to use the smart phone;
FIG. 7 is a schematic diagram of a fingerprint unlock that is tamper proof according to an embodiment of the present application;
FIG. 8 is a flowchart illustrating an implementation of a method for unlocking a fingerprint according to an embodiment of the present application;
fig. 9 is a schematic diagram of a touch operation according to an embodiment of the present application;
FIG. 10 is a schematic illustration of an unlocking operation provided by an embodiment of the present application;
FIG. 11 is a system for sharing data states of devices according to an embodiment of the present application;
fig. 12 is a flowchart of an implementation of a method for unlocking a fingerprint according to a second embodiment of the present application;
fig. 13 is a schematic diagram illustrating a partition of an identification trigger area according to an embodiment of the present application;
fig. 14 is a schematic diagram of three unlocking prompt messages provided in an embodiment of the present application;
fig. 15 is a schematic diagram illustrating an acquisition of a first touch operation according to an embodiment of the present application;
fig. 16 is a schematic diagram illustrating an acquisition of a first touch operation according to another embodiment of the present disclosure;
fig. 17 is a schematic diagram illustrating an acquisition of a first touch operation according to another embodiment of the present disclosure;
FIG. 18 is a diagram illustrating an offset between a click operation and a display object according to an embodiment of the present application;
FIG. 19 is a diagram illustrating a click operation provided by an embodiment of the present application;
FIG. 20 is a graphical illustration of the amount of deviation between the sliding operation and the standard trajectory provided by an embodiment of the present application;
FIG. 21 is a schematic view of a sliding operation provided by an embodiment of the present application;
FIG. 22 is a schematic view of a sliding operation provided by another embodiment of the present application;
fig. 23 is a flowchart of an implementation of a method for unlocking a fingerprint according to a third embodiment of the present application;
fig. 24 is a flowchart of an implementation of a method for unlocking a fingerprint according to a fourth embodiment of the present application;
fig. 25 is a flowchart of an implementation of a method for unlocking a fingerprint according to a fifth embodiment of the present application;
fig. 26 is a flowchart of an implementation of a method for unlocking a fingerprint according to a sixth embodiment of the present application;
fig. 27 is a flowchart of an implementation of a method for unlocking a fingerprint according to a seventh embodiment of the present application;
fig. 28 is a flowchart of an implementation of a method for unlocking a fingerprint according to an eighth embodiment of the present application;
FIG. 29 is a diagram illustrating a failure to match a fingerprint according to an embodiment of the present application;
FIG. 30 is a flowchart of an implementation of a method for unlocking a fingerprint according to a ninth embodiment of the present application;
fig. 31 is a block diagram illustrating a fingerprint unlocking apparatus according to an embodiment of the present application;
FIG. 32 is a block diagram of a fingerprint unlocking device according to another embodiment of the present application;
FIG. 33 is a block diagram of an apparatus for fingerprint unlocking according to another embodiment of the present application;
fig. 34 is a schematic diagram of an electronic device according to another embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The fingerprint unlocking method provided by the embodiment of the application can be applied to electronic devices such as a mobile phone, a tablet personal computer, a wearable device, a vehicle-mounted device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and the like, and the embodiment of the application does not limit the specific types of the electronic devices.
For example, the electronic device may be a Station (ST) in a WLAN, and may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with Wireless communication capability, a computing device or other processing device connected to a Wireless modem, a computer, a laptop, a handheld communication device, a handheld computing device, and/or other devices for communicating on a Wireless system, and a next generation communication system, such as a Mobile terminal in a 5G Network or a Mobile terminal in a future evolved Public Land Mobile Network (PLMN) Network, and so on.
By way of example and not limitation, when the electronic device is a wearable device, the wearable device may also be a generic term for intelligently designing daily wear, developing wearable devices, such as glasses, gloves, watches, clothing, shoes, and the like, by applying wearable technology. The wearable device is either worn directly on the user or is a portable device integrated into the user's clothing or accessory that collects biometric data of the user by attaching to the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable intelligent device has the advantages that the generalized wearable intelligent device is full in function and large in size, can realize complete or partial functions without depending on a smart phone, such as a smart watch or smart glasses, and only concentrates on a certain application function, and needs to be matched with other devices such as the smart phone for use, such as various smart bracelets and smart jewelry containing touch screens capable of being unlocked.
Fig. 1 shows a schematic structural diagram of an electronic device 100.
The electronic device 100 may include aprocessor 110, anexternal memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, amobile communication module 150, a wireless communication module 160, anaudio module 170, a speaker 170A, areceiver 170B, amicrophone 170C, an earphone interface 170D, a sensor module 180, a key 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identification Module (SIM)card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: theprocessor 110 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors.
The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided inprocessor 110 for storing instructions and data. In some embodiments, the memory in theprocessor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by theprocessor 110. If theprocessor 110 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of theprocessor 110, thereby increasing the efficiency of the system.
In some embodiments,processor 110 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
The I2C interface is a bi-directional synchronous serial bus that includes a serial data line (SDA) and a Serial Clock Line (SCL). In some embodiments,processor 110 may include multiple sets of I2C buses. Theprocessor 110 may be coupled to the touch sensor 180K, the charger, the flash, the camera 193, etc. through different I2C bus interfaces, respectively. For example: theprocessor 110 may be coupled to the touch sensor 180K via an I2C interface, such that theprocessor 110 and the touch sensor 180K communicate via an I2C bus interface to implement the touch functionality of the electronic device 100.
The I2S interface may be used for audio communication. In some embodiments,processor 110 may include multiple sets of I2S buses. Theprocessor 110 may be coupled to theaudio module 170 via an I2S bus to enable communication between theprocessor 110 and theaudio module 170. In some embodiments, theaudio module 170 may communicate audio signals to the wireless communication module 160 via the I2S interface, enabling answering of calls via a bluetooth headset.
The PCM interface may also be used for audio communication, sampling, quantizing and encoding analog signals. In some embodiments, theaudio module 170 and the wireless communication module 160 may be coupled by a PCM bus interface. In some embodiments, theaudio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to implement a function of answering a call through a bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus used for asynchronous communications. The bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is generally used to connect theprocessor 110 with the wireless communication module 160. For example: theprocessor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, theaudio module 170 may transmit the audio signal to the wireless communication module 160 through a UART interface, so as to realize the function of playing music through a bluetooth headset.
MIPI interfaces may be used to connectprocessor 110 with peripheral devices such as display screen 194, camera 193, and the like. The MIPI interface includes a Camera Serial Interface (CSI), a Display Serial Interface (DSI), and the like. In some embodiments,processor 110 and camera 193 communicate through a CSI interface to implement the capture functionality of electronic device 100. Theprocessor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal and may also be configured as a data signal. In some embodiments, a GPIO interface may be used to connect theprocessor 110 with the camera 193, the display 194, the wireless communication module 160, theaudio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, a MIPI interface, and the like.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transmit data between the electronic device 100 and a peripheral device. And the earphone can also be used for connecting an earphone and playing audio through the earphone. The interface may also be used to connect other electronic devices, such as AR devices and the like.
It should be understood that the connection relationship between the modules according to the embodiment of the present invention is only illustrative, and is not limited to the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The charging management module 140 is configured to receive charging input from a charger. The charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 may receive charging input from a wired charger via the USB interface 130. In some wireless charging embodiments, the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used to connect the battery 142, the charging management module 140 and theprocessor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140, and supplies power to theprocessor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be used to monitor parameters such as battery capacity, battery cycle count, battery state of health (leakage, impedance), etc. In some other embodiments, the power management module 141 may also be disposed in theprocessor 110. In other embodiments, the power management module 141 and the charging management module 140 may be disposed in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, themobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
Themobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied to the electronic device 100. Themobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. Themobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. Themobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of themobile communication module 150 may be disposed in theprocessor 110. In some embodiments, at least some of the functional modules of themobile communication module 150 may be disposed in the same device as at least some of the modules of theprocessor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating a low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then passes the demodulated low frequency baseband signal to a baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs a sound signal through an audio device (not limited to the speaker 170A, thereceiver 170B, etc.) or displays an image or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as themobile communication module 150 or other functional modules, independent of theprocessor 110.
The wireless communication module 160 may provide a solution for wireless communication applied to the electronic device 100, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), bluetooth (bluetooth, BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to theprocessor 110. The wireless communication module 160 may also receive a signal to be transmitted from theprocessor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves.
In some embodiments, antenna 1 of electronic device 100 is coupled tomobile communication module 150 and antenna 2 is coupled to wireless communication module 160 so that electronic device 100 can communicate with networks and other devices through wireless communication techniques. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), code division multiple access (code division multiple access, CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division code division multiple access, TD-SCDMA), Long Term Evolution (LTE), LTE, BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou navigation satellite system (BDS), a quasi-zenith satellite system (QZSS), and/or a Satellite Based Augmentation System (SBAS).
The electronic device 100 implements display functions via the GPU, the display screen 194, and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Theprocessor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. The display panel may adopt a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), and the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, with N being a positive integer greater than 1. The display screen 194 may include a touch panel as well as other input devices. The touch panel, also called a touch screen, may collect a touch operation performed by a user on or near the touch panel (for example, an operation performed by the user on or near the touch panel using any suitable object such as a finger or a stylus pen), and drive the corresponding connection device according to a preset program. In a possible implementation manner, a fingerprint identification module under the screen is configured below the touch screen, and a user can perform a pressing operation in an installation area corresponding to the fingerprint identification module under the screen, so that fingerprint information of a finger used when the user performs the pressing operation can be acquired. Exemplarily, fig. 2 shows a schematic structural diagram of an off-screen fingerprint identification module provided in an embodiment of the present application. As shown in fig. 2, the size of a module of an off-screen fingerprint identification module configured on a mobile phone may be consistent with that of a touch screen, and in this case, when a user unlocks, the user may press any area on the touch screen of the electronic device, so that fingerprint information of the user may be acquired and an unlocking process is triggered; the module size of this fingerprint identification module under screen can be different with the touch-control screen, and under this condition, fingerprint identification module can install in any position of touch-control screen below under the screen, and the user need press the operation in appointed area (be the mounted position of fingerprint identification module under the screen), just can gather and obtain fingerprint information to trigger the unblock flow.
The electronic device 100 may implement a shooting function through the ISP, the camera 193, the video codec, the GPU, the display 194, the application processor, and the like.
The ISP is used to process the data fed back by the camera 193. For example, when a photo is taken, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing and converting into an image visible to naked eyes. The ISP can also carry out algorithm optimization on the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing element converts the optical signal into an electrical signal, which is then passed to the ISP where it is converted into a digital image signal. And the ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into image signal in standard RGB, YUV and other formats. In some embodiments, the electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process digital image signals and other digital signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to perform fourier transform or the like on the frequency bin energy.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: moving Picture Experts Group (MPEG) 1, MPEG2, MPEG3, MPEG4, and the like.
The NPU is a neural-network (NN) computing processor that processes input information quickly by using a biological neural network structure, for example, by using a transfer mode between neurons of a human brain, and can also learn by itself continuously. Applications such as intelligent recognition of the electronic device 100 can be realized through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, and the like.
Theexternal memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the memory capability of the electronic device 100. The external memory card communicates with theprocessor 110 through theexternal memory interface 120 to implement a data storage function. For example, files such as music, video, etc. are saved in an external memory card.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The internal memory 121 may include a program storage area and a data storage area. The storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like. The storage data area may store data (such as audio data, phone book, etc.) created during use of the electronic device 100, and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like. Theprocessor 110 executes various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The electronic device 100 may implement audio functions via theaudio module 170, the speaker 170A, thereceiver 170B, themicrophone 170C, the headphone interface 170D, and the application processor. Such as music playing, recording, etc.
Theaudio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. Theaudio module 170 may also be used to encode and decode audio signals. In some embodiments, theaudio module 170 may be disposed in theprocessor 110, or some functional modules of theaudio module 170 may be disposed in theprocessor 110.
The speaker 170A, also called a "horn", is used to convert the audio electrical signal into an acoustic signal. The electronic apparatus 100 can listen to music through the speaker 170A or listen to a handsfree call.
Thereceiver 170B, also called "earpiece", is used to convert the electrical audio signal into an acoustic signal. When the electronic apparatus 100 receives a call or voice information, it can receive voice by placing thereceiver 170B close to the ear of the person.
Themicrophone 170C, also referred to as a "microphone," is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can input a voice signal to themicrophone 170C by speaking the user's mouth near themicrophone 170C. The electronic device 100 may be provided with at least onemicrophone 170C. In other embodiments, the electronic device 100 may be provided with twomicrophones 170C to achieve a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device 100 may further include three, four ormore microphones 170C to collect sound signals, reduce noise, identify sound sources, perform directional recording, and so on.
The headphone interface 170D is used to connect a wired headphone. The headset interface 170D may be the USB interface 130, or may be a 3.5mm open mobile electronic device platform (OMTP) standard interface, a cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used for sensing a pressure signal, and converting the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A can be of a wide variety, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a sensor comprising at least two parallel plates having an electrically conductive material. When a force acts on the pressure sensor 180A, the capacitance between the electrodes changes. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the intensity of the touch operation according to the pressure sensor 180A. The electronic apparatus 100 may also calculate the touched position from the detection signal of the pressure sensor 180A. In some embodiments, the touch operations that are applied to the same touch position but different touch operation intensities may correspond to different operation instructions. For example: and when the touch operation with the touch operation intensity smaller than the first pressure threshold value acts on the short message application icon, executing an instruction for viewing the short message. And when the touch operation with the touch operation intensity larger than or equal to the first pressure threshold value acts on the short message application icon, executing an instruction of newly building the short message.
The gyro sensor 180B may be used to determine the motion attitude of the electronic device 100. In some embodiments, the angular velocity of electronic device 100 about three axes (i.e., the x, y, and z axes) may be determined by gyroscope sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects a shake angle of the electronic device 100, calculates a distance to be compensated for by the lens module according to the shake angle, and allows the lens to counteract the shake of the electronic device 100 through a reverse movement, thereby achieving anti-shake. The gyroscope sensor 180B may also be used for navigation, somatosensory gaming scenes.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, electronic device 100 calculates altitude, aiding in positioning and navigation, from barometric pressure values measured by barometric pressure sensor 180C.
The magnetic sensor 180D includes a hall sensor. The electronic device 100 may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device 100 is a flip phone, the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the opening and closing state of the leather sheath or the opening and closing state of the flip cover, the automatic unlocking of the flip cover is set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity can be detected when the electronic device 100 is stationary. The method can also be used for recognizing the posture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some embodiments, taking a picture of a scene, electronic device 100 may utilize range sensor 180F to range for fast focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device 100 emits infrared light to the outside through the light emitting diode. The electronic device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100. When insufficient reflected light is detected, the electronic device 100 may determine that there are no objects near the electronic device 100. The electronic device 100 can utilize the proximity light sensor 180G to detect that the user holds the electronic device 100 close to the ear for talking, so as to automatically turn off the screen to achieve the purpose of saving power. The proximity light sensor 180G may also be used in a holster mode, a pocket mode automatically unlocks and locks the screen.
The ambient light sensor 180L is used to sense the ambient light level. Electronic device 100 may adaptively adjust the brightness of display screen 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust the white balance when taking a picture. The ambient light sensor 180L may also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in a pocket to prevent accidental touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 can utilize the collected fingerprint characteristics to unlock the fingerprint, access the application lock, photograph the fingerprint, answer an incoming call with the fingerprint, and so on. The fingerprint sensor is used for collecting fingerprint information of a user, and the fingerprint sensor comprises but is not limited to: capacitive fingerprint sensors, optical fingerprint sensors, thermal fingerprint sensors, and the like. Different fingerprint sensors have different triggering and identifying principles, for example, for a device for fingerprint information acquisition based on a capacitive fingerprint sensor, when a fingerprint acquisition control unit detects that a capacitance value fed back by the capacitive fingerprint sensor changes, a fingerprint identification area is identified to have a pressing operation, and fingerprint information corresponding to the pressing operation moment is acquired through the capacitive fingerprint sensor; for the device for collecting fingerprint information based on the optical fingerprint sensor, the fingerprint collection control unit can judge whether the fingerprint identification area has pressing operation or not based on the pixel value in the total reflection image fed back by the optical fingerprint sensor. In a possible implementation manner, the fingerprint acquisition module may further be configured with a pressure sensor, and if the pressure value detected by the fingerprint acquisition control unit in the fingerprint acquisition module by the pressure sensor is greater than a preset pressure threshold, fingerprint information in the fingerprint identification area is acquired.
The temperature sensor 180J is used to detect temperature. In some embodiments, electronic device 100 implements a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device 100 performs a reduction in performance of a processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection. In other embodiments, the electronic device 100 heats the battery 142 when the temperature is below another threshold to avoid the low temperature causing the electronic device 100 to shut down abnormally. In other embodiments, when the temperature is lower than a further threshold, the electronic device 100 performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown due to low temperature.
The touch sensor 180K is also called a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation applied thereto or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may be disposed on a surface of the electronic device 100, different from the position of the display screen 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, the bone conduction sensor 180M may acquire a vibration signal of the human vocal part vibrating the bone mass. The bone conduction sensor 180M may also contact the human pulse to receive the blood pressure pulsation signal. In some embodiments, the bone conduction sensor 180M may also be disposed in a headset, integrated into a bone conduction headset. Theaudio module 170 may analyze a voice signal based on the vibration signal of the bone mass vibrated by the sound part acquired by the bone conduction sensor 180M, so as to implement a voice function. The application processor can analyze heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M, so as to realize the heart rate detection function.
The keys 190 include a power-on key, a volume key, and the like. The keys 190 may be mechanical keys. Or may be touch keys. The electronic apparatus 100 may receive a key input, and generate a key signal input related to user setting and function control of the electronic apparatus 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration cues, as well as for touch vibration feedback. For example, touch operations applied to different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also respond to different vibration feedback effects for touch operations applied to different areas of the display screen 194. Different application scenes (such as time reminding, receiving information, alarm clock, game and the like) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
Indicator 192 may be an indicator light that may be used to indicate a state of charge, a change in charge, or a message, missed call, notification, etc.
TheSIM card interface 195 is used to connect a SIM card. The SIM card can be brought into and out of contact with the electronic apparatus 100 by being inserted into theSIM card interface 195 or being pulled out of theSIM card interface 195. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. TheSIM card interface 195 may support a Nano SIM card, a Micro SIM card, a SIM card, etc. The sameSIM card interface 195 can be inserted with multiple cards at the same time. The types of the plurality of cards may be the same or different. TheSIM card interface 195 may also be compatible with different types of SIM cards. TheSIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to implement functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, namely: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
The software system of the electronic device 100 may employ a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the present invention uses an Android system with a layered architecture as an example to exemplarily illustrate a software structure of the electronic device 100.
Fig. 3 is a block diagram of the software configuration of the electronic apparatus 100 according to the embodiment of the present invention.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages.
As shown in fig. 3, the application package may include applications such as camera, gallery, calendar, phone call, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 3, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The phone manager is used to provide communication functions of the electronic device 100. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), Media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The following describes exemplary workflow of the software and hardware of the electronic device 100 in connection with capturing a photo scene.
When the touch sensor 180K receives a touch operation, a corresponding hardware interrupt is issued to the kernel layer. The kernel layer processes the touch operation into an original input event (including touch coordinates, a time stamp of the touch operation, and other information). The raw input events are stored at the kernel layer. And the application program framework layer acquires the original input event from the kernel layer and identifies the control corresponding to the input event. Taking the touch operation as a touch click operation, and taking a control corresponding to the click operation as a control of a camera application icon as an example, the camera application calls an interface of an application framework layer, starts the camera application, further starts a camera drive by calling a kernel layer, and captures a still image or a video through the camera 193.
In the prior art, when a finger with a fingerprint input by a user touches a fingerprint identification area of an electronic device by mistake, the electronic device is unlocked without unlocking intention of the user, so that the possibility of misoperation is increased. The misoperation is specifically an operation that the user does not intend to execute the operation initiated this time, or another operation different from the operation that the user intends to execute.
Fig. 4 is a schematic diagram illustrating a scenario that a smart phone provided by an embodiment of the present application is placed in a bag. The user places the smart mobile phone and other articles in the handbag, and when the user stretches out the hand and turns over in the handbag and look for other articles, the fingerprint identification area of smart mobile phone is touched to the mistake, and at this moment, if the finger that touches the smart mobile phone by mistake is the finger that the user has input the unblock fingerprint, the smart mobile phone can be because of the fingerprint matches the successful unblock to the smart mobile phone. At this time, since the user unlocks the smartphone without the unlocking intention, the user may mistakenly touch an application program or an icon or the like in the unlocked operation interface when finding an object, which may cause a misoperation on the smartphone, such as dialing a phone call of the client or sending a short message to another user, and the like, and may cause an adverse effect on the user.
In another application scenario, the electronic device may be a smart phone. Exemplarily, fig. 5 shows a scene schematic diagram of a smartphone provided in an embodiment of the present application in a certain holding state of a user. The user places the smart phone on the desktop, and need take away the smart phone (the smart phone is in the lock screen state this moment) when the user leaves the desk, when the user used a certain gesture of holding to hold the smart phone, the finger of having typed the unblock fingerprint probably touched the fingerprint identification region of smart phone, and the smart phone can switch to the unblock state from the lock screen state. Because the unlocking operation is an unintentional unlocking behavior of the user, the user does not know that the smart phone is unlocked, and an application program or an icon and the like in an operation interface after unlocking can be touched in the process of holding the smart phone by the user, so that misoperation on the smart phone is caused, and the use experience of the user is reduced.
Illustratively, fig. 6 shows a scene schematic diagram of a smartphone provided in an embodiment of the present application in a state where a user intends to use the smartphone. With reference to the scene diagrams of fig. 4 to 6, it can be determined that, in a state where the user does not intend to unlock, state data of the smartphone, such as a holding state, a moving speed, and an apparatus pose, related to the apparatus, is different from the state data in a state where the user intends to unlock.
The method for preventing unlocking caused by mistaken touch is mainly realized by indicating a user to perform corresponding unlocking intention authentication operation after fingerprint identification and matching, so that the fingerprint unlocking is judged to be intentional unlocking of the user and is not mistakenly touched. Exemplarily, fig. 7 shows a fingerprint unlocking schematic diagram for preventing false touch according to an embodiment of the present application. Referring to fig. 7, when a user presses a fingerprint acquisition area with a finger with entered fingerprint information, if the electronic device detects that the fingerprint matching is successful, the electronic device will not unlock the device immediately, but will display an operation prompt message, for example, "slide up to unlock operation" in the figure, the user may execute corresponding operation according to the operation prompt message, and if the operation initiated by the user matches with the operation specified in the operation prompt message, unlock the device, and identify the intentional unlocking behavior of the user; otherwise, the unlocking operation is identified as unintended unlocking, and the screen locking state of the equipment is maintained. Although the above manner can avoid the false touch behavior of the user, in some scenes, the user cannot complete the corresponding unlocking operation in the operation prompt information, for example, the user holds the smart phone with one hand and holds other objects with the other hand, at this time, the user is in a state of controlling the smart phone with one hand, and the user may be difficult to complete the designated operation, for example, sliding the operation such as a preset distance or a designated track, thereby causing the unlocking failure. Therefore, although the occurrence of the false touch unlocking can be avoided by the operation task of completing the command, the unlocking efficiency of the user is also reduced. In order to solve the problems in the prior art, the fingerprint unlocking method provided by the embodiment of the application can generate the false touch recognition result based on the device state data by collecting the fingerprint information and the device state data during the pressing operation of the user, and does not need to execute the specified unlocking operation by the user every time of the unlocking operation, so that the probability of occurrence of false touch unlocking is reduced, and the unlocking efficiency of the user can be improved.
The first embodiment is as follows:
referring to fig. 8, an executing subject of the fingerprint unlocking method is an electronic device, and the electronic device may be a smart phone, a tablet computer, a computer, or any device configured with a fingerprint identification module. Fig. 8 shows a flowchart of an implementation of a method for unlocking a fingerprint according to an embodiment of the present application, which is detailed as follows:
in S81, if it is detected that the fingerprint identification area has been pressed in the lock screen state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In this embodiment, the electronic device obtains the fingerprint information of the user through the fingerprint acquisition module or the touch screen with the function of identifying the fingerprint under the screen.
In a possible implementation manner, a touch screen built in the electronic device is configured with an underscreen fingerprint identification module, and a fingerprint identification area of the underscreen fingerprint identification module may cover the entire touch screen or be set in a designated area of the touch screen. If the under-screen fingerprint identification module covers the whole touch screen, the fingerprint unlocking process is triggered when a user presses any area of the touch screen in the screen locking state of the electronic equipment; if the under-screen fingerprint identification module is arranged in the designated area of the touch screen, the user needs to press the designated area of the touch screen to trigger the fingerprint unlocking process.
Exemplarily, fig. 9 shows a schematic diagram of a touch operation provided in an embodiment of the present application. Referring to fig. 9, the electronic device includes a touch screen having an off-screen fingerprint recognition function, and a dotted area is used to indicate an effective area where off-screen fingerprint recognition can be implemented. Referring to fig. 9 (a), when the electronic device detects that the pressing operation of the user is in the effective area, the electronic device collects fingerprint information corresponding to the pressing operation and device state data at the current time, that is, executes a fingerprint unlocking process, and performs a false touch identification according to the device state data; referring to fig. 9 (b), when the electronic device detects that the pressing operation of the user is outside the effective area, the electronic device does not collect fingerprint information and device status data at the time of the pressing operation, and recognizes that the user does not need to perform a device unlocking operation.
In this embodiment, when the electronic device detects that the fingerprint identification area has a pressing operation, the fingerprint information corresponding to the fingerprint acquisition area at the pressing operation time may be acquired through the fingerprint acquisition module, and the device state data corresponding to the pressing operation time may also be acquired. The device status data includes, but is not limited to: pose information, time information, pressing position coordinates, moving speed information and the like.
In one possible implementation, the electronic device may have built in motion sensors including, but not limited to: gyroscopes, acceleration sensors, angular velocity sensors, and the like. When the electronic equipment detects that the fingerprint acquisition area has the pressing operation, the offset parameter of the equipment motion to the gyroscope can be determined according to the speed of the angular velocity sensor, and the attitude angle corresponding to the electronic equipment at the pressing operation moment can be determined according to the offset parameter and the deflection quantity of the gyroscope; and determining the motion speed and the motion direction of the electronic equipment according to the speeds fed back by the acceleration sensor and the angular speed sensor. And taking the attitude angle, the movement speed and the movement direction as the equipment state data of the electronic equipment.
In a possible implementation manner, the electronic device may be configured with a pressure sensor in the fingerprint identification area, and the electronic device may obtain, by the pressure sensor, a pressure value corresponding to a time when the pressing operation is performed, and use the pressure value as one of the device state data. Since the larger the pressure value is, the higher the probability that the user intentionally performs fingerprint unlocking is, the pressure value of the pressing operation in the fingerprint identification area can be used as the reference data of the false touch identification.
In a possible implementation manner, the electronic device may obtain, through the proximity sensor, a distance value between the electronic device and an object located closest to the electronic device in the scene when detecting that the fingerprint identification area has a pressing operation, and use the distance value as one item of data in the device state data. For example, in a scenario where the electronic device is placed in a pocket, a distance between the electronic device and an object in the surrounding environment is small, for example, the electronic device may be close to an inner surface of the pocket; and under the scene of normal unlocking, the screen of the electronic equipment is over against the user, a certain distance exists between the screen of the equipment and the user at the moment, and the distance value acquired by the proximity sensor is larger, so that whether the unlocking operation is mistaken touch unlocking or not can be determined according to the distance value. Based on this, the distance value of the proximity sensor can be used as reference data for the false touch recognition.
In a possible implementation manner, when it is detected that the fingerprint identification area has a pressing operation, the electronic device may acquire, through the camera module, a scene image of the electronic device at the pressing operation time, determine, through the scene image, an ambient light intensity corresponding to the pressing operation time and a scene object included in the scene where the electronic device is located, and use the ambient light and the scene object as two items of data in the device state data. Exemplarily, fig. 10 shows a schematic diagram of an unlocking operation provided by an embodiment of the present application. As shown in fig. 10 (a), in a scene where a user intentionally unlocks the device, a screen of the device may face a face of the user, and a scene image acquired by the front camera module may include a face image; referring to fig. 10 (b), if the electronic device is placed in a pocket or a handbag, the user may touch the fingerprint identification area by mistake to trigger the unlocking operation, and the ambient light intensity may be lower than the ambient light intensity in the normal use state (generally, in the normal use state, in the exposed environment, the light intensity is stronger). Based on the reasons, whether the unlocking operation is mistaken touch unlocking or not can be determined in an auxiliary mode through the ambient light intensity and the scene object.
In this embodiment, the fingerprint information may be a fingerprint image or fingerprint feature data extracted based on the fingerprint image. If the fingerprint information is fingerprint feature data, the electronic device can receive a fingerprint image fed back by the fingerprint identification area, analyze the acquired fingerprint image through a preset fingerprint analysis algorithm, and acquire the fingerprint feature data corresponding to the fingerprint image. The fingerprint feature data includes but is not limited to: the fingerprint patterns (for example, a funnel (whorl), an arch (arch), and a loop (loop)), the average distance between the patterns, the number of the patterns, and the like.
In a possible implementation manner, after receiving the fingerprint image fed back by the fingerprint acquisition module, the electronic device can perform image enhancement on the fingerprint image through a preset preprocessing algorithm, so that the accuracy of subsequent fingerprint matching or fingerprint feature data extraction can be improved. The preprocessing algorithm comprises processing means such as contrast enhancement, binarization, graying, sharpness adjustment, brightness adjustment, image noise reduction and the like.
In S82, a fingerprint matching result of the fingerprint information and a standard fingerprint is obtained, and a false touch recognition result is generated according to the unlocking state data recorded in the historical unlocking process and the device state data.
Fingerprint matching process:
in this embodiment, the electronic device may be pre-entered with at least one standard fingerprint. The standard fingerprint may be a standard fingerprint image, or may be standard fingerprint data extracted based on the standard fingerprint image. The manner of acquiring the fingerprint image and extracting the standard fingerprint data may refer to the related discussion of the previous step, which is not described herein again.
In this embodiment, the electronic device may generate a fingerprint matching result according to the matching degree between the fingerprint information acquired by the current acquisition and the standard fingerprint. If the matching degree is larger than a preset matching threshold, outputting a fingerprint matching result which is successfully matched; otherwise, if the matching degree is smaller than or equal to the preset matching threshold, outputting the fingerprint matching result of which the matching fails.
In a possible implementation manner, if the fingerprint information is a fingerprint image, the manner of calculating the matching degree between the fingerprint information and the standard fingerprint may be: the electronic equipment stores a standard image corresponding to a standard fingerprint, takes the standard image as a background image, takes the fingerprint image as a foreground image, performs operations such as rotation and translation on the fingerprint image, calculates the contact ratio between the two images at each position, takes the maximum value of the contact ratio as the matching degree between the two images, and obtains a fingerprint matching result based on the obtained matching degree.
In a possible implementation manner, if the fingerprint information is a fingerprint feature data, the manner of calculating the matching degree between the fingerprint information and the standard fingerprint may be: the fingerprint feature data comprises parameter values of all fingerprint feature dimensions, an N-dimensional fingerprint feature vector is constructed based on the dimension number of all fingerprint feature dimensions, the dimension number of the specific fingerprint feature dimension of the N is the number, and the fingerprint feature vector can be expressed as { f }1,f2,f3,...,fnIn which fiThe characteristic value of the ith fingerprint characteristic dimension includes, for example, but not limited to: the line shape of the fingerprint, the average distance between lines, the number of the line shapes and the like. Correspondingly, the electronic device stores a standard feature vector corresponding to the standard fingerprint. The electronic device may calculate a vector distance between the fingerprint feature vector and the standard feature vector and determine a degree of match between the fingerprint feature vector and the standard feature vector based on the vector distance. Specifically, if the vector distance between the fingerprint feature vector and the standard feature vector is smaller, the corresponding matching degree is larger; conversely, if the vector distance is larger, the corresponding matching degree is smaller.
(II) false touch identification process:
in this embodiment, the electronic device may match the device state data with unlocking state data recorded in a historical unlocking process, determine whether the pressing operation is intentional unlocking operation at this time, and determine a false touch recognition result based on the determination result. The false touch recognition result includes but is not limited to: false touch operation and non-false touch operation. The false touch recognition result of the false touch operation indicates that the pressing operation is not the unlocking operation and is used for unlocking behavior triggered unintentionally; the false touch recognition result of the non-false touch operation indicates that the current pressing operation is the unlocking operation and is the unlocking behavior intentionally triggered. The electronic equipment can perform false touch recognition according to the equipment state data. Because equipment state data is gathered in the pressing operation process to need not the user and carry out corresponding intention identification operation, touch the identification process by mistake promptly and be imperceptible to the user, thereby improve the unblock efficiency and improve the convenient degree of unblock. It should be noted that the unlocking state data may be unlocking state data corresponding to an unlocking operation performed locally on the electronic device, or unlocking state data corresponding to an unlocking operation performed in a different place by another device, that is, the electronic device may establish a data synchronization link with the cloud server or another device to obtain unlocking state data of the other device.
In a possible implementation manner, the device state data collected by the electronic device includes an ambient light intensity value and a placement state of the electronic device; in this case, the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data may specifically be: if the electronic equipment detects that the ambient light intensity value is smaller than a preset light intensity threshold value and the placement state of the electronic equipment is a preset state, for example, the electronic equipment is in a horizontal placement state, the electronic equipment is identified to be in an idle scene, and the false touch identification result of false touch operation is output; the idle scenes comprise an idle scene placed in the pocket and an idle scene placed in the bag, namely the electronic equipment is placed in the bag or the pocket, and at the moment, the user does not consciously control the electronic equipment, so that the unlocking operation can be recognized as mistaken touch unlocking.
In one possible implementation manner, the manner of generating the false touch recognition result based on the device status data may be: the electronic device may download the unlock state data from the cloud server. The unlocking state data may be obtained based on historical loading data uploaded by each device of a model corresponding to the electronic device, and the historical state data is device state data acquired by a user in a deliberate unlocking state. Illustratively, fig. 11 shows a system for sharing device data states according to an embodiment of the present application. The sharing system of the device data state comprises an electronic device A used by a target user, a cloud server and an electronic device B used by other users. The electronic device A can establish communication connection with the cloud server through a built-in client program, and the cloud server can acquire the unlocking state data, and upload historical state data corresponding to unlocking operation to the cloud server when a target user executes intentional unlocking operation. Similarly, the electronic device B used by another user may also upload historical state data corresponding to the unlocking operation to the cloud server when the other user performs a deliberate unlocking operation. The cloud server is used for storing historical state data uploaded by all electronic devices, performing feature extraction based on all the historical state data, obtaining state data corresponding to the electronic devices when users perform unlocking operation intentionally, and obtaining unlocking state data. The mode of determining the unlocking state data based on the historical data can be obtained through statistical or big data model training (for example, adopting a supervised learning model such as an SVM, a neural network model, an ensemble learning model, and the like). After receiving the unlocking state data fed back by the cloud server, the electronic device A can match the acquired device state data with the unlocking state data, and obtain the false touch recognition result based on the matching result. For example, the unlock state data configures corresponding state parameter ranges for different state dimensions. Table 1 shows a data structure diagram of unlock state data provided in an embodiment of the present application. As shown in table 1, the state dimension includes a pressure dimension, a coordinate dimension corresponding to the pressing operation in the fingerprint recognition area, and an apparatus attitude angle (the apparatus attitude angle may be determined by a deflection amount of a three-dimensional coordinate axis). The electronic equipment can compare the equipment state data acquired this time with the unlocking state data downloaded from the cloud server, determine the number of matched state dimensions, and obtain the false touch recognition result based on the number of matched state dimensions. For example, if the parameter values of each state dimension in the device state data are matched with the unlocking state data, outputting a false touch identification result of non-false touch operation; otherwise, if the parameter value of any state dimension in the equipment state data is not matched with the unlocking state data, outputting a false touch identification result of false touch operation.
Pressure value of pressingRange of press coordinate positionsAmount of X-axis deflectionAmount of deflection of Y axisAmount of Z-axis deflection
0.5N-2N(80,160)~(160,160)50-100140-160120-140
TABLE 1
Optionally, the electronic device may configure corresponding false touch weights for different state dimensions, and when the electronic device may calculate the matching degree between the device state data and the unlock state data, the electronic device may count the number of the matched state dimensions, and calculate the matching degree based on the false touch weights corresponding to the state dimensions. For example, the press pressure value has a false touch weight of 0.5, the press coordinate position has a false touch weight of 0.2, and the deflection amount corresponding to each coordinate axis has a false touch weight of 0.1. If the state dimensions matched with the state data of a certain device are the pressing coordinate position, the X-axis deflection and the Y-axis deflection, the corresponding matching degree is calculated as follows: 0.2+0.1+0.1 ═ 0.4.
In one possible implementation manner, the manner of generating the false touch recognition result based on the device status data may be: the electronic device may obtain a plurality of status data of the user during the use of the device, including but not limited to: the state data corresponding to the unlocking operation, the state data of the electronic equipment in the walking state, the state data in the video scene watched through the electronic equipment, the state data in the call state and the like. The electronic device can configure corresponding state labels for different state data, and train a preset classification model based on all the state labels and the state data to obtain a state classification model which can be used for identifying whether the state classification model is in an unlocking state. The electronic equipment can import the equipment state data into the state classification model, identify the state label corresponding to the equipment state data, and identify whether the pressing operation of the user is mistakenly touched according to the state label. As described above, the status tag may include: unlocking operation state, walking state, video watching state and conversation state. As for the call state and the walking state, the electronic equipment is usually not allowed to be operated, and if the electronic equipment identifies that the equipment state data belongs to any state label, an operation identification result of the false touch operation is output; for the unlocking operation state and the video watching state, the electronic equipment is often required to be in a screen opening state, and if the electronic equipment identifies that the equipment state data belongs to any one of the state tags, an operation identification result of non-error touch operation is output.
(III) regarding the sequence of the execution of the fingerprint matching process and the false touch identification process:
in this embodiment, the electronic device may execute the two operations at the same time, that is, the electronic device may invoke two asynchronous processes, where one process is used to respond to the fingerprint matching operation and the other process is used to respond to the false touch recognition operation. Of course, the electronic device may also execute the two operations based on a preset execution sequence, for example, perform fingerprint matching first, and then perform false touch recognition based on the device status data; or the false touch identification is carried out firstly, and then the matching is carried out with the standard fingerprint based on the fingerprint information.
In this embodiment, based on the difference between the fingerprint matching result and the false touch recognition result, the following three different response operations can be handled. If the electronic device detects that the fingerprint matching result is a successful match (i.e., the fingerprint information matches the standard fingerprint) and the false touch identification result is a false touch operation, then the operation of S83 is executed; if the electronic device detects that the fingerprint matching result is a successful match (i.e. the fingerprint information matches the standard fingerprint) and the false touch identification result is a non-false touch operation, then the operation of S84 is executed; if the electronic device detects that the fingerprint matching result is a matching failure, the operation of S85 is executed regardless of whether the false touch recognition result is a false touch operation. In this embodiment, the execution order between the fingerprint matching result and the false touch recognition result does not have a certain sequence, and the electronic device needs to obtain the two recognition results and then execute the response determination process.
In S83, if the fingerprint matching result is a successful match and the false touch recognition result is a false touch operation, the screen lock state is maintained.
In this embodiment, if the fingerprint matching is successful, it indicates that the user performing the pressing operation at this time is an entered legal user, and identifies that the unlocking operation is legal, and since the false touch identification result is a false touch operation, it indicates that the user does not intentionally perform the unlocking operation, and belongs to a false touch unlocking behavior. The screen locking state is specifically a limited operation state of an interactive control of the electronic device, and only specified operations can be executed, such as screen lighting, password unlocking, fingerprint unlocking, and the like.
In S84, if the fingerprint matching result is a successful match and the false touch recognition result is a non-false touch operation, an unlocking operation is performed.
In this embodiment, if the fingerprint matching is successful, it indicates that the user performing the pressing operation is a logged-in legitimate user, and identifies that the unlocking operation is legitimate, and the false touch identification result is a non-false touch operation, and indicates that the user intends to unlock the electronic device, at this time, the unlocking operation may be performed on the electronic device, that is, the electronic device may be changed from the screen-locked state to the unlocked state. The unlocking state is specifically an unlimited operation state of an interactive control of the electronic device, and may be, for example, a sliding operation on a sliding screen, and an operation on an application program, a control, and the like on an operation interface.
Further, as another embodiment of the present application, after S84, the method may further include:
in S841, the unlocking state data corresponding to the unlocking operation is generated, and the unlocking state data is used to determine a false touch recognition result.
In this embodiment, when the electronic device detects that the current unlocking operation is an unlocking operation of the user without a wrong touch, the electronic device performs a result on the device intentionally. Accordingly, the electronic device may acquire the unlock state data corresponding to the unlock operation through each sensor in the electronic device, or may directly use the device state data acquired in S81 as the unlock state data corresponding to the unlock operation. The unlocking state data are stored in the unlocking state database related to historical unlocking operation, so that in the daily unlocking process of a user, sample data in the unlocking state database can be continuously increased, automatic collection of the sample data can be realized, the operation behavior of the user can be updated, and the accuracy of mistaken touch identification is improved.
In a possible implementation manner, when the electronic device generates the unlock state data, a corresponding time tag may be configured for the unlock state data. The smaller the difference between the time tag and the time of performing the false touch recognition operation is, the higher the corresponding weighting weight is, and the weighting weight is used for contribution effect in the subsequent generation of the false touch recognition result.
For example, if the electronic device specifically obtains the unlocking characteristic value based on all the unlocking state data when recognizing the false touch recognition result, in this case, the unlocking characteristic value may be obtained by superimposing according to each unlocking state data and the weighting weight. The specific calculation formula is as follows:
Figure BDA0002596468370000241
wherein, UnlockediAn unlocking characteristic value of the ith state dimension; timejA weighted weight corresponding to the jth unlock state data, the additionThe weight is determined based on the difference between the time label of the unlocking state data and the time of the false touch recognition operation; hislockedijThe parameter value of the ith state dimension in the jth unlocking state data; m is the total number of the unlocking state data; n is the total number of state dimensions.
For example, when the electronic device identifies the false touch identification result, specifically, the matching number of the unlocking state data and the device state data is counted, and the unlocking probability corresponding to the device state data is obtained based on the matching number, so that the false touch identification result is generated based on the unlocking probability. In this case, when the unlocking probability is calculated according to the matching number, weighted superposition may be performed according to the weighted weights associated with the unlocking state data that are matched with the device state data, so as to obtain the unlocking probability.
Since the usage habit of the user may change over time during the usage of the electronic device. The smaller the difference between the time tag and the time of performing the false touch recognition operation is, namely the closer the difference is to the current time, the more similar the current unlocking habit of the user using the electronic equipment is, the higher the weighting weight is configured, so that the contribution of the latest unlocking habit of the user to the false touch recognition can be increased, the judgment logic of the false touch recognition can be updated along with the operation habit of the user, and the accuracy of the false touch recognition is improved.
In the embodiment of the application, the corresponding unlocking state data is generated after the unlocking operation is executed, so that the number of sample data in the process of generating the false touch recognition result is enriched, and the accuracy of subsequent false touch recognition can be improved.
In S85, if the fingerprint matching result is a match failure, the lock screen state is maintained.
In this embodiment, if the fingerprint matching fails, it indicates that the user performing the pressing operation is not an entered legal user, and no matter whether the unlocking operation is an intentional unlocking behavior, the device does not need to be unlocked, and the electronic device may maintain the screen locking state at this time.
In the embodiment of the application, when a user presses a fingerprint identification area, the electronic device acquires fingerprint information and also acquires device state data corresponding to the pressing operation moment, the device state data is compared with unlocking state data corresponding to a conventional unlocking process of the user based on the device state data, the device state data is compared with the unlocking state data corresponding to the conventional unlocking process of the user, a false touch identification result is obtained based on the comparison result, identification of a false touch event is achieved, a screen locking state is maintained when the false touch operation is determined, the possibility of false operation is reduced, and the use experience of the user is improved.
Example two:
different from the first embodiment, in the present embodiment, the manner of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is specifically as follows: and determining the unlocking probability of the intentional unlocking operation of the user at this time by counting the number of unlocking state data matched with the collected equipment state data at this time, and obtaining a false touch recognition result based on the unlocking probability.
Fig. 12 shows a flowchart of an implementation of a method for unlocking a fingerprint according to a second embodiment of the present application, which is detailed as follows:
in S121, if it is detected that the fingerprint identification area has a pressing operation in the screen lock state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S122, a fingerprint matching result of the fingerprint information with a standard fingerprint is obtained.
In S123, the number of matches of the unlock state data that matches the device state data is counted from the unlock state data of all the historical unlock operations.
In this embodiment, the unlocking state data may be unlocking state data acquired when the electronic device performs an unlocking operation in a use process, or may be unlocking state data about other electronic devices acquired from the cloud server. In particular, in an initial use stage of the electronic device (the initial use stage may be determined based on a use duration, for example, if the use duration is less than a preset duration threshold, the initial use stage is identified as the initial use stage; the initial use stage may also be determined based on an unlocking frequency, for example, if the number of times of the unlocking operation performed by the electronic device is less than a preset unlocking frequency threshold, the terminal device is identified as the initial use stage), the unlocking state data may be downloaded from the cloud server; on the contrary, if the electronic device is not in the initial stage of use, the unlocking state data acquired locally can be used,
in a possible implementation manner, the electronic device may perform discrete statistical analysis on unlocking state data of all historical unlocking operations to obtain a plurality of unlocking behavior types. Each unlocking behavior type corresponds to a state parameter interval, and the state parameter interval can be determined and obtained according to all unlocking state data belonging to the unlocking behavior type. For example, the electronic device may perform cluster analysis on all unlocking state data to obtain a plurality of unlocking clustering centroids, and determine the state parameter interval according to the unlocking clustering centroids and the effective centroid range. And marking a coverage space corresponding to each unlocking behavior type on a preset coordinate system according to the unlocking clustering mass center and the effective mass center range, and determining the unlocking behavior type of the unlocking state data based on the coverage space in which the unlocking state data falls on the coordinate system, so that the unlocking times of each unlocking behavior type can be obtained through statistics. Table 2 shows a statistical information table of unlocking behavior types provided in an embodiment of the present application. Referring to table 2, the unlock state data includes five state dimension parameters, which are the identification trigger region, the pressing pressure value of the pressing operation, and the attitude angle of the current electronic device (the attitude angle may be determined by the offset from the three-dimensional coordinate axis). Of course, the above state dimension may also include: unlocking time, information of the current position of the user, the movement speed and the movement direction of the equipment and the like. The pressing area may be determined according to a coordinate point of the pressing operation, or the fingerprint identification area of the electronic device may be divided into a plurality of identification trigger areas, and a parameter value corresponding to the identification trigger area is determined based on a number of the identification trigger area into which the pressing operation falls. Exemplarily, fig. 13 shows a schematic diagram of dividing a trigger area according to an embodiment of the present application. Referring to fig. 13, the fingerprint acquisition area of the electronic device covers the whole screen, the screen is divided into 12 areas according to the preset grid size, corresponding numbers are configured for the fingerprint acquisition areas, and then parameter values of dimensions of the "identification trigger area" in the unlocking state parameters corresponding to the unlocking operation can be determined according to the area acted by the pressing operation. If the pressed identification trigger area in fig. 11 is 8, the parameter value of the dimension of the "identification trigger area" in the unlock state data corresponding to the unlocking operation is "8".
Figure BDA0002596468370000251
Figure BDA0002596468370000261
TABLE 2
In a possible implementation manner, the electronic device may configure corresponding associated offsets for each state dimension included in the device state data. And if the difference value between the parameter value of each state dimension in the unlocking state data of the historical unlocking operation and the parameter value of the corresponding state dimension in the equipment state parameters is smaller than the correlation offset, identifying that the equipment state data is matched with the unlocking state data, so that the matching number of the unlocking state data matched with the equipment state data can be obtained. For example, the device state data includes three state dimensions of recognition trigger coordinates, a press pressure value and an attitude angle, the associated offset corresponding to each state dimension is (± 15), (± 1), (± 30 °), the device state parameter acquired at this time is specifically ([15,20], 5, 100 °), the unlock state data of the device state parameter needs to be (the distance from the point [15,20] is less than or equal to 15), the press pressure value is (4-6), and the attitude angle is (70 ° -130 °). And if the unlocking state data corresponding to the historical unlocking operation is ([15,21], 5 and 110 degrees) and the difference value between each state dimension of the equipment state parameter is smaller than the associated offset, identifying the unlocking state data as being matched with the equipment state data. If the unlocking state data corresponding to the historical unlocking operation is ([15,21], 1, 110 °), the unlocking state data is identified to be not matched with the device state data because the difference value between the pressing pressure dimension and the pressing pressure value of the device state data is greater than the associated offset.
In S124, an unlocking probability is determined based on the matching number, and the false touch recognition result is obtained according to the unlocking probability and a preset unlocking determination threshold.
In this embodiment, if the number of the unlocking state data matched with the device state data is larger, the corresponding unlocking probability is larger, which indicates that the present pressing operation is the intentional unlocking operation; conversely, if the number of unlocking state data matches the device state data is smaller, the corresponding unlocking probability is smaller, indicating that the present pressing operation is not an intentional unlocking operation.
In a possible implementation manner, the manner of determining the unlocking probability based on the matching number may be: and calculating the ratio of the matching number to the total number of all unlocking state data, and determining the unlocking probability based on the ratio. For example, the total number of the unlock state data is 30, the number of the unlock state data matched with the device state data collected this time is 15, the ratio of the two is 50%, the 50% may be used as the unlock probability, and a corresponding adjustment weight, for example, 1.5, may be configured for the ratio, so that the final unlock probability is 50% × 1.5 — 75%.
In a possible implementation manner, the electronic device matches the matching number with each preset reference range, and obtains a corresponding unlocking probability based on a matching result. Table 3 shows a correspondence table of the unlocking probability. Referring to table 3, the electronic device sets a correspondence table of a plurality of reference ranges, and the correspondence table configures corresponding unlocking probabilities for different reference ranges. And determining the unlocking probability corresponding to the equipment state data according to the matching number obtained by the statistics.
Range of number of matchesProbability of unlocking
0~520%
6~1560%
15~+∞100%
TABLE 3
In this embodiment, the electronic device may obtain the false touch recognition result according to the unlocking probability obtained by the current recognition and the comparison result between the preset unlocking determination thresholds. Specifically, if the unlocking probability is greater than or equal to the unlocking judgment threshold, generating a false touch recognition result of non-false touch operation; otherwise, if the unlocking probability is smaller than the unlocking judgment threshold, generating a false touch recognition result of the false touch operation.
In S125, if the fingerprint matching result is a successful match and the false touch identification result is a false touch operation, the screen locking state is maintained.
Further, as another embodiment of the present application, S125 may specifically include:
in S1253, if the unlocking probability is smaller than the unlocking determination threshold, unlocking prompt information is output.
In this embodiment, when the electronic device detects that the unlocking probability is smaller than the preset unlocking determination threshold, it needs to further determine whether the user has an unlocking intention, so that an unlocking prompt message is output. The unlocking prompt information is specifically used for prompting the user to execute the corresponding intention authentication operation. The above intent authentication operations include, but are not limited to: pressing a designated area, sliding a specific distance in a designated direction, or drawing a designated sliding trajectory. Fig. 14 shows schematic diagrams of three unlocking prompt messages provided in an embodiment of the present application. Referring to fig. 14, the prompt information in (a) in fig. 14 is a region designated for pressing; here, the designated pressing area may be an area different from the pressing operation initiated in S121, and in particular, may be another area having a distance greater than a preset threshold from the pressing operation initiated in S121. The prompt information in (b) of fig. 14 is to prompt the user to slide a specified distance in the horizontal direction. The prompt information in (c) in fig. 14 is to prompt the user to draw a "Z" -shaped slide trajectory.
Different from the prior art, the electronic device does not need the user to perform the intention authentication operation every time the electronic device performs the unlocking operation, and only when the unlocking probability is detected to be smaller than the unlocking determination threshold value, the user is required to perform the intention authentication operation, and when the unlocking probability is detected to be larger than or equal to the unlocking determination threshold value, the intention authentication operation is not required. That is, only when it is determined that the user is likely to perform the false touch operation this time, the intention authentication operation needs to be performed, so as to further improve the accuracy of the false touch recognition, and avoid the situation that the user cannot unlock the electronic device when the user has an unlocking intention.
In S1254, if the first touch operation matched with the unlocking prompt information is not received within the preset effective response time, the screen locking state is maintained.
In this embodiment, after the electronic device outputs the unlocking prompt information, a preset operation monitoring timer is started, and the screen is kept in a lighting state in the detection process, so as to collect the touch operation of the user. If the count value of the operation timer is greater than the effective response time and the touch operation initiated by the user is not received or the touch operation initiated by the user is not matched with the unlocking prompt message, executing the operation of S1254; and if the touch operation which is initiated by the user and matched with the unlocking prompt information is received when the count value of the operation timer is less than or equal to the effective response time, executing the operation of S1255.
In this embodiment, the receiving no first touch operation matching with the unlocking prompt message includes: the user does not initiate any touch operation within the effective response time, and the touch operation initiated by the user within the effective response time is not matched with the unlocking prompt information. The touch operation matched with the unlocking prompt information specifically comprises the following steps: and touch operation, wherein the operation deviation between the standard operations corresponding to the unlocking prompt information is smaller than a preset deviation threshold value. The operation deviation may be specifically determined according to a type of a standard operation indicated by the unlocking prompt information, for example, if the operation type of the standard operation is a click operation, the operation deviation is specifically a distance value between the operation deviation and a specified coordinate of the click operation; if the operation type of the standard operation is a sliding operation in a specified direction, the operation deviation is specifically a vector included angle between the operation type and the specified direction; if the operation type of the standard operation is to draw a specified sliding track, the operation deviation is specifically a deviation amount from the specified sliding track.
Exemplarily, fig. 15 shows an acquisition schematic diagram of a first touch operation provided in an embodiment of the present application. Referring to (a) in fig. 15, in order to determine whether the user has an unlocking intention, the electronic device displays a prompt message drawing a "Z" -shaped sliding trajectory on the touch screen. If the user intentionally unlocks, the electronic device may acquire a first touch operation with a higher similarity to the "Z" shape, as shown in (b) of fig. 15; on the contrary, if the user does not intend to illustrate the lock, the sliding track corresponding to the first touch operation collected by the electronic device may have a larger difference from the "Z" shaped sliding track, as shown in fig. 15 (c), and at this time, the electronic device may recognize that the first touch operation matching with the unlocking prompt information is not received.
Exemplarily, fig. 16 shows an acquisition schematic diagram of a first touch operation provided in another embodiment of the present application. Referring to (a) of fig. 16, in order to determine whether the user has an unlocking intention, the electronic device displays a prompt message sliding in an upward direction to a preset position on the touch screen. If the user intends to unlock, the electronic device may acquire a first touch operation moving from the pressing area to the designated area, as shown in (b) of fig. 16; on the contrary, if the user does not intend to illustrate the lock, the first touch operation collected by the electronic device is not the movement track of the preset position, as shown in fig. 16 (c), and at this time, the electronic device recognizes that the first touch operation matched with the unlocking prompt information is not received.
Exemplarily, fig. 17 shows an acquisition schematic diagram of a first touch operation provided in another embodiment of the present application. Referring to (a) of fig. 17, in order to determine whether the user has an unlocking intention, the electronic device clicks a prompt message of a designated area on the touch screen. If the user intends to unlock, the electronic device may acquire a pressing operation of the designated area, as shown in (b) of fig. 17; on the contrary, if the user does not intend to illustrate the lock, the electronic device may recognize that the first touch operation matched with the unlocking prompt information is not received when the first touch operation acquired by the electronic device is not the pressing operation in the designated area, as shown in fig. 17 (c).
In this embodiment, when the user cannot initiate the first touch operation matched with the unlocking prompt information within the effective response time, it indicates that the unlocking operation of the user is an unintended unlocking operation, and at this time, the device is maintained in the screen locking state.
In S1255, if the first touch operation matched with the unlocking prompt information is received within the valid response time, an unlocking operation is performed.
In this embodiment, when the user initiates a touch operation matched with the standard operation corresponding to the unlocking prompt information within the effective response time, it is recognized that the unlocking operation is the intended unlocking operation of the user, and the electronic device is unlocked at this time.
In the embodiment of the application, when the unlocking probability is detected to be low, namely, when the false touch recognition result is the false touch operation, the prompt unlocking prompt information is generated so as to further confirm the unlocking intention of the user, and therefore the accuracy of false unlocking recognition is improved.
Further, as another embodiment of the present application, before S1253, the method further includes:
in S1251, a last historical pressing time corresponding to a historical pressing operation successfully matched with the standard fingerprint is acquired, and a pressing interval is determined based on the historical pressing time and the pressing operation time.
In this embodiment, when the electronic device outputs the false touch recognition result, the unlocking determination threshold may be dynamically adjusted according to a pressing interval of the pressing operation by the user. The history pressing operation of the previous fingerprint matching success specifically comprises the following steps: and another historical pressing operation which is closest to the pressing operation initiated by the user in the fingerprint identification area at the time is performed from all the historical pressing operations of which the collected fingerprint information is matched with the standard fingerprint. The electronic device may record the trigger time of each pressing operation, that is, the historical pressing time, and calculate a time difference between the historical pressing time corresponding to the historical pressing operation that was successfully matched with the standard fingerprint last time and the time of the pressing operation initiated this time, to obtain the pressing interval. For example, if the user triggers a pressing operation in the fingerprint identification area at 14:10:15, the first historical pressing time when the user last initiated the first pressing operation (but the fingerprint matching was unsuccessful) is 14:10:13, the second historical pressing time when the user initiated the second pressing operation initiated the second time close to the current time (the fingerprint matching was successful) is 14:10:10, and the first pressing operation does not match the standard fingerprint, the pressing interval is calculated by calculating the pressing interval from the second historical pressing time of the second pressing operation and the pressing operation time of the pressing operation initiated this time, that is, 14:10:15-14:10:10 is 5s, and the pressing interval corresponding to the pressing operation this time is 5 s.
In one possible implementation, in order to reduce the storage pressure of the database, the electronic device may configure the maximum storage duration for the time tag of each pressing operation, for example, 60 s. The electronic device may configure a timer for an operation record corresponding to each pressing operation, where the operation record includes a historical pressing time corresponding to the pressing operation. And if the count value of the timer of any operation record is detected to be larger than the maximum storage time length, deleting the operation record. Therefore, if the pressing interval between two pressing operations of the user is greater than 60s, the corresponding operation record of the last pressing operation does not exist in the current pressing operation, and at this time, if it is detected that the current pressing operation does not have the associated last pressing operation, the pressing interval is configured to be a default value, for example, 60 s.
In S1252, the unlock determination threshold is configured based on the press interval.
In this embodiment, the electronic device may determine the unlocking determination threshold used in the false touch recognition process according to the pressing interval. This unblock is judged the threshold value and is used for judging this time to press the operation and whether to touch the operation for the mistake, specifically: if the unlocking probability is greater than or equal to the unlocking judgment threshold, obtaining a false touch identification result of non-false touch operation; and otherwise, if the unlocking probability is smaller than the unlocking judgment threshold, obtaining a false touch identification result of the false touch operation. Wherein, if the shorter the pressing interval is, the smaller the numerical value of the corresponding unlocking judgment threshold value is; conversely, the longer the pressing interval, the larger the numerical value of the corresponding unlock determination threshold. Because the user presses the fingerprint identification area for many times in a short time interval, and the acquired fingerprint information is matched with the standard fingerprint, the identification user has stronger unlocking intention at the moment. Based on the unlocking judgment method, the electronic equipment can reduce the unlocking judgment threshold value corresponding to the non-error touch operation, so that the occurrence probability that the unlocking cannot be successfully performed due to the fact that the equipment state corresponding to the unlocking operation is inconsistent with the unlocking state obtained in the history due to the change of the operation habit under the condition that the unlocking intention exists is reduced.
In one possible implementation manner, the electronic device may be divided into a plurality of pressing interval regions, and corresponding unlocking determination threshold values are divided for different pressing interval regions. Alternatively, if there are only two pressing interval regions, that is, two intervals greater than a certain interval threshold and less than or equal to the certain interval threshold, the electronic device may compare the pressing interval with the interval threshold, and determine the unlocking determination threshold based on the comparison result. For example, the pressing interval is divided into two intervals, which are greater than 5s or less than or equal to 5s, and each pressing interval area is configured with a corresponding unlocking determination threshold, for example, a pressing interval greater than 5sThe unlocking determination threshold value configured in the interval is Tα1The unlock determination threshold value of the pressing interval of 5s or less is Tα2
In one possible implementation, the electronic device may establish a transfer function between the press interval and the unlock determination threshold, e.g., TαF (break), where TαThe break is the pressing interval for the unlock determination threshold. Alternatively, the pressing interval is inversely proportional to the unlock determination threshold.
In the embodiment of the application, the unlocking judgment threshold value is adjusted by determining the pressing interval between the historical pressing operation successfully matched with the fingerprint at the last time and the current moment, so that the occurrence probability that the unlocking cannot be successfully performed due to the fact that the equipment state corresponding to the unlocking operation at this time is inconsistent with the unlocking state obtained by historical acquisition due to the change of the operation habit under the condition that the unlocking intention exists is reduced, and the accuracy of false touch recognition is improved.
In S126, if the fingerprint matching result is a successful match and the false touch identification result is a non-false touch operation, an unlocking operation is performed.
Further, as another embodiment of the present application, after S126, the method further includes:
in S1261, the unlock state data corresponding to the unlock operation is generated, and the unlock state data is used to determine a false touch recognition result.
Further, as another embodiment of the present application, after S1261, the method further includes:
in S1262, a second touch operation initiated by the user on the electronic device is monitored, and the valid identifier corresponding to the unlocking state data is configured based on the second touch operation.
In this embodiment, after the electronic device is unlocked, a second touch operation initiated by the user on the electronic device may be acquired, where the touch operation includes but is not limited to: the method comprises the steps of performing touch screen operation on a screen, performing pressing operation on keys on the electronic equipment and the like. In a possible implementation manner, the electronic device may configure a monitoring duration for a monitoring process of the second touch operation, that is, collect all touch instructions initiated by the user within the monitoring duration from the unlocking time of the electronic device, that is, serve as the second touch operation. It should be noted that, if the user does not initiate any touch operation within the monitoring duration, the second touch operation may be null.
In this embodiment, the operation behavior of the acquired second touch operation is analyzed, so as to determine whether the second touch operation is a intentionally initiated touch operation of the user, and configure an effective identifier corresponding to the unlocking state based on the intention recognition result. Specifically, if the second touch operation is an unintended touch operation, identifying the unlock state data as invalid unlock data, and configuring a valid identifier; on the contrary, if the second touch operation is the intentional touch operation, the unlocking state data is necessarily valid unlocking data, and a valid identifier is configured.
In a possible implementation manner, if the second touch operation is null, that is, the user does not initiate any touch operation within the monitoring duration, the valid identifier of the unlock state data is configured as the first bit value. And when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data. If the user needs to unlock the equipment, the user often needs to perform related operations on the equipment, and the user does not perform any operation after unlocking, the unlocking operation can be identified as mistaken touch unlocking and not intentional unlocking operation.
In a possible implementation manner, if the second touch operation is specifically a click operation, and the click coordinates corresponding to all the click operations in the monitoring duration do not have an operable display object on the display interface, for example, an icon of an application program or an operable control is not included, but an inoperable display object such as a background picture is displayed. At this time, the electronic device recognizes the second touch operation as an unintended touch operation, and configures the valid identifier of the unlock state data as a first bit value.
The manner of configuring the valid identifier of the unlock state data according to the second touch operation may be:
mode one (determining valid identifier based on coordinate offset):
1. if the second touch operation is a click operation on any display object in a display interface, calculating an offset between a click coordinate of the click operation and a center coordinate of the display object;
2. if the offset is larger than a preset offset threshold, configuring the effective identifier of the unlocking state data into a first bit value; when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data;
3. if the offset is smaller than or equal to the offset threshold, configuring the valid identifier of the unlocking state data as a second bit value; and when the effective identifier is a second bit value, identifying the unlocking state data as effective unlocking state data.
In this embodiment, if the second touch operation initiated by the user after the unlock state is a click operation, a click coordinate corresponding to the click operation on the display interface may be obtained. Since a certain contact area exists between a finger of the user initiating the click operation and the touch screen, that is, the click operation of the user corresponds to a click area, the coordinate of the geometric center of the click area can be used as the click coordinate. The electronic equipment can identify the display object indicated by the clicking operation, acquire the corresponding center coordinate of the display object on the display interface, calculate the offset between the clicking coordinate and the center coordinate, and judge whether the clicking operation is the intentional clicking operation or not based on the offset. The display object is specifically an operable object in the display interface, such as a virtual key, a dialog box, an information prompt box, an application icon, an input box, and the like.
Illustratively, fig. 18 shows a schematic diagram of an offset between a click operation and a display object provided by an embodiment of the present application. Referring to fig. 18, a display object indicated by a click operation initiated by a user is an application program 1, and the electronic device may obtain a click coordinate of the click operation and a center coordinate of a corresponding icon of the application program 1 in a display interface, calculate a distance value between the two coordinates, and use the distance value as the offset.
Illustratively, fig. 19 shows a schematic diagram of a click operation provided by an embodiment of the present application, where an offset threshold of the electronic device is x. Referring to fig. 19 (a), after the electronic device is unlocked, a click operation of the user on the application program 1 is detected, and an offset between the click operation and the center coordinate of the application program 1 is z, where z is less than x, at this time, the electronic device recognizes that the user is intentionally performing the click operation, and thus recognizes that the unlock state data is valid data and is set as a second bit value.
Referring to fig. 19 (b), after the electronic device is unlocked, a click operation of the user on the application program 1 is detected, and an offset between the click operation and the center coordinate of the application program 1 is y, where y > x, and at this time, the electronic device recognizes that the user performs the click operation unconsciously, and thus recognizes that the unlocked state data is invalid data, and sets the data to be the first bit value.
Referring to (c) of fig. 19, after the electronic device is unlocked, a click operation of the user on the current interface is detected, and the click operation does not have a corresponding application program or valid control, at this time, the user is identified as an unintentional click operation, and therefore, the unlock state data is identified as invalid data and is set as a first bit value.
In this embodiment, if the offset amount is greater than the preset offset threshold, it is recognized that the user may not click the display object under an intentional condition, and at this time, the valid identifier is configured as the first bit value, that is, the unlock state data is recognized as invalid unlock data. Otherwise, if the offset is less than or equal to the offset threshold, it is recognized that the user clicks the display object under the intentional condition, and at this time, the valid identifier is configured as a second bit value, that is, the unlock state data is recognized as valid unlock data. The electronic equipment can obtain the false touch recognition result of the equipment state data through the effective unlocking state data. Alternatively, the electronic device may delete invalid unlock state data.
Mode two (determination of valid flag based on amount of sliding track deviation):
1. if the touch operation is a sliding operation, calculating the deviation amount between the sliding track of the sliding operation and the standard track;
2. if the deviation amount is larger than a preset deviation threshold value, configuring the effective identifier of the unlocking state data into a first bit value; when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data;
3. if the deviation amount is smaller than or equal to the deviation threshold value, configuring the valid identifier of the unlocking state data as a second bit value; and when the effective identifier is a second bit value, identifying the unlocking state data as effective unlocking state data.
In this embodiment, if the second touch operation initiated by the user after the unlock state is a sliding operation, a sliding track corresponding to the current click operation on the display interface may be obtained. The electronic device can identify the sliding type corresponding to the sliding track, and compare the sliding track with the standard track of the corresponding sliding type to obtain the deviation amount. The slide type may be divided based on the direction of the slide trajectory, such as an upward slide, a leftward slide, a downward slide, and an upward slide; the sliding type may also be divided according to a trajectory shape of the sliding trajectory, for example, a straight shape, a circular shape, a Z-shape, or the like. The deviation amount may be the length of a non-overlapping portion between two tracks, or an included angle between two tracks.
Illustratively, fig. 20 shows a schematic diagram of the deviation amount between the sliding operation and the standard trajectory provided by an embodiment of the present application. Referring to fig. 20, the sliding operation initiated by the user is sliding to the right, and a sliding angle of the sliding to the right and the standard track have a certain included angle, which can be taken as a deviation amount between the two sliding tracks.
Exemplarily, fig. 21 shows a schematic diagram of a sliding operation provided by an embodiment of the present application, where a deviation angle of the electronic device is x. Referring to fig. 21 (a), after the electronic device is unlocked, it is detected that the user has initiated a rightward sliding operation, an included angle between the rightward sliding operation and the horizontal rightward direction is z, and z is less than x, at this time, the electronic device recognizes that the user intentionally performs the sliding operation, and thus recognizes that the unlock state data is valid data, and sets the unlock state data as a second bit value.
Referring to fig. 21 (b), after the electronic device is unlocked, it is detected that the user has initiated a rightward sliding operation, an included angle between the rightward sliding operation and the horizontal rightward direction is y, and y is greater than x, at this time, the electronic device recognizes that the user has performed an unintentional sliding operation, and thus recognizes that the unlock state data is invalid data, and sets the unlock state data as a first bit value.
Referring to (c) in fig. 21, after the electronic device is unlocked, the sliding operation of the user on the current interface is detected, but the direction of the sliding operation cannot be identified, and there is no preset gesture matching with the sliding operation, at this time, the user is identified as an unintended sliding operation, and therefore, the unlocking state data is identified as invalid data and is set as the first bit value.
Illustratively, fig. 22 shows a schematic diagram of a sliding operation provided by another embodiment of the present application, where an effective sliding length of the electronic device is l, and a deviation angle threshold is x. As shown in (a) in fig. 2, after the electronic device is unlocked, it is detected that the user initiates a rightward sliding operation, and a distance t of the rightward sliding operation is obtained, where t is greater than l, at this time, an included angle z between the rightward sliding operation and the horizontal right is determined, and if the included angle z is less than x, the electronic device recognizes that the user performs the sliding operation with intent, and thus recognizes that the unlocking state data is valid data, and sets the unlocking state data as a second bit value.
Referring to fig. 22 (b), after the electronic device is unlocked, it is detected that the user initiates a rightward sliding operation, and a distance s of the rightward sliding operation is obtained, where s is greater than l, at this time, an included angle y between the rightward sliding operation and the horizontal rightward direction is determined, and if the included angle y is greater than x, at this time, the electronic device recognizes that the user performs an unintentional sliding operation, and thus, the unlocked state data is recognized as invalid data and is set as a first bit value.
Referring to (c) in fig. 22, after the electronic device is unlocked, it is detected that the user initiates a rightward sliding operation, and a distance q of the rightward sliding operation is obtained, where q is less than l, and at this time, no matter whether an included angle between the rightward sliding operation and the horizontal rightward is less than x, the electronic device recognizes that the user performs the sliding operation unconsciously, and thus recognizes that the unlock state data is invalid data, and sets the unlock state data to be a first bit value.
Therefore, whether the recognition operation is a valid operation can be determined by a plurality of feature quantities, for example, by the moving distance of the sliding track, the angle with the standard direction, the similarity with the standard sliding track, and the like, and if the plurality of feature quantities are all within the preset valid feature range, the touch operation is recognized as a valid operation.
In a possible implementation manner, the number of the second touch operations may be multiple, in this case, the electronic device may collect multiple continuous touch operations of the user, respectively execute the effective determination process, and determine the effective identifier of the unlocking state data based on effective identification results of the multiple touch operations.
In this embodiment, if the deviation amount is greater than the preset deviation threshold, it is recognized that the user may not generate the sliding track under an intentional condition, and at this time, the valid flag is configured as the first bit value, that is, the unlock state data is recognized as invalid unlock data. On the contrary, if the deviation amount is less than or equal to the deviation threshold, it is recognized that the user generates the sliding track under the intentional condition, and at this time, the valid identifier is configured as the second bit value, that is, the unlock state data is recognized as valid unlock data. The electronic equipment can obtain the false touch recognition result of the equipment state data through the effective unlocking state data. Alternatively, the electronic device may delete invalid unlock state data.
In the embodiment of the application, after the electronic equipment is unlocked, intention identification can be carried out on subsequent touch operation of a user, and effective identification configuration is carried out on unlocking state data corresponding to the unlocking operation based on the intention identification, so that the influence of invalid unlocking state data on a false touch identification process can be reduced, and the accuracy of the false touch identification is improved.
It should be noted that S1253 to S1255 are used for determining the unlocking intention of the user; and step S1262 is also for determining the unlocking intention of the user. I.e. the two embodiments described above need to achieve similar technical effects. Therefore, if S125 in the second embodiment is implemented by specifically using S1253 to S1255, S126 may not include S1262 thereafter; if S1262 is included after S126 in the second embodiment, S125 may be implemented without using S1253 to S1255.
Further, as another embodiment of the present application, after S1262, the method may further include:
in S1263, if the valid identifier of the unlock state data is the first bit value, a screen lock operation is performed.
In this embodiment, if it is detected that the second touch operation performed by the user after the unlock state is an unintended unlock behavior and the valid identifier of the unlock state data is configured as the first bit value, the screen lock operation may be performed on the electronic device again, so that the user is prevented from continuing to perform the unintended false touch behavior, and the influence of the false touch behavior is reduced.
In S127, if the fingerprint matching result is a matching failure, the lock screen state is maintained.
In the embodiment of the application, the matching number between the acquired equipment state data and the unlocking state data of historical unlocking operation is counted, so that whether the habit of pressing the fingerprint identification area is consistent with the historical unlocking behavior or not can be judged, whether the pressing operation is mistaken touch operation or not is identified, the mistaken touch identification is identified, the screen locking state is kept when the mistaken touch operation is determined, the misoperation of a user is avoided, and the use experience of the user is improved.
Example three:
different from the first embodiment, in the present embodiment, the manner of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is specifically as follows: and training the obtained mistaken touch recognition model according to the unlocking state data recorded in all historical unlocking processes, and importing the obtained equipment state data into the mistaken touch recognition model so as to output a mistaken touch recognition result.
Fig. 23 shows a flowchart of an implementation of a method for unlocking a fingerprint according to a third embodiment of the present application, which is detailed as follows:
in S231, if it is detected that the fingerprint identification area has a pressing operation in the screen-locked state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S232, a fingerprint matching result of the fingerprint information and a standard fingerprint is obtained.
In S233, importing the device state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
In this embodiment, the above false touch recognition model includes, but is not limited to: and the intelligent recognition model is obtained by model training of a Support Vector Machine (SVM), a decision tree, ensemble learning, a neural network and the like.
In a possible implementation manner, the electronic device may obtain the above false touch recognition model through a local training manner. If the false touch recognition model is obtained in a local training mode, unlocking state data needs to be obtained firstly. In this case, the electronic device may obtain the unlock state data in a local collection manner, for example, in a process that a user uses the electronic device, the device state data of the electronic device at the time of performing the unlock operation is recorded every time the user performs the unlock operation, so as to obtain the unlock state data. The electronic equipment can also acquire the obtained unlocking state data in a downloading mode from the cloud server, under the condition, the state data of the equipment at the moment of executing the unlocking operation is recorded by the electronic equipment and other equipment every time the unlocking operation is executed, and the state data are uploaded to the cloud server, namely the cloud server can store the unlocking state data of all the terminals, and the electronic equipment can be downloaded from the cloud server. Of course, the user may first download the original unlock state data from the cloud, and then acquire the unlock state data in a manner of collecting the unlock state data from the local use process.
In a possible implementation manner, the electronic device may further obtain the false touch recognition model in a cloud downloading manner. The training process can be executed at the cloud server, and the electronic equipment only needs to download the error touch recognition model from the cloud server. Under this condition, electronic equipment can upload the unblock state data that the collection obtained to the high in the clouds server in the use to through the above-mentioned mistake of high in the clouds server update adjustment recognition model that touches, the high in the clouds server can regularly release above-mentioned mistake and touch recognition model.
In a possible implementation manner, the electronic device may obtain the false touch recognition model in a manner of combining cloud downloading and local training. In this case, the cloud server may train the unlocking state data uploaded by each device to obtain an original model, and send the original model to the electronic device. The electronic equipment can acquire unlocking state data in the using process, and trains the original model based on the locally acquired unlocking state data to acquire the false touch recognition model.
In S234, if the fingerprint matching result is a successful match and the false touch identification result is a false touch operation, the screen locking state is maintained.
Further, as another embodiment of the present application, if the false touch recognition result includes an unlocking probability, S234 specifically includes:
in S2343, if the unlocking probability is smaller than the unlocking determination threshold, unlocking prompt information is output.
At S2344, if the first touch operation matched with the unlocking prompt information is not received within a preset effective response time, the screen locking state is maintained.
In S2345, if the first touch operation matched with the unlocking prompt information is received within the valid response time, an unlocking operation is performed.
Further, as another embodiment of the present application, before S2343, the method further includes:
in S2341, a historical pressing time corresponding to a last historical pressing operation successfully matched with the standard fingerprint is obtained, and a pressing interval is determined based on the historical pressing time and the pressing operation time.
In S2342, the unlocking determination threshold value is configured based on the pressing interval.
In S235, if the fingerprint matching result is a successful match and the false touch identification result is a non-false touch operation, an unlocking operation is performed.
Further, as another embodiment of the present application, after S235, the method further includes:
in S2351, the unlocking state data corresponding to the unlocking operation is generated, and the unlocking state data is used for training the false touch recognition model.
Further, as another embodiment of the present application, after S2351, the method further includes:
in S2352, a second touch operation initiated by the user on the electronic device is monitored, and the valid identifier corresponding to the unlock state data is configured based on the second touch operation.
Note that S2343 to S2345 are used to determine the unlocking intention of the user; and step S2352 is also for determining the user' S unlocking intention. I.e. the two embodiments described above need to achieve similar technical effects. Therefore, if S234 is implemented by using the methods of S2343 to S2345 in the second embodiment, S2352 may not be included after S235; if S2352 is included after S235 in the second embodiment, S234 may not be implemented in the manners of S2343 to S2345.
Further, as another embodiment of the present application, after S2352, the method may further include:
at S2353, if the valid identifier of the unlock state data is the first bit value, performing a screen lock operation; and when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data.
In S236, if the fingerprint matching result is a matching failure, the lock screen state is maintained.
In the embodiment of the application, the matching number between the acquired equipment state data and the unlocking state data of historical unlocking operation is counted, so that whether the habit of pressing the fingerprint identification area is consistent with the historical unlocking behavior or not can be judged, whether the pressing operation is mistaken touch operation or not is identified, the mistaken touch identification is identified, the screen locking state is kept when the mistaken touch operation is determined, the misoperation of a user is avoided, and the use experience of the user is improved.
Example four:
different from the first embodiment, in the fourth embodiment, the operation of obtaining the fingerprint matching result of the fingerprint information and the standard fingerprint is performed first, and after the fingerprint matching result is successful, the operation of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is performed.
Fig. 24 shows a flowchart of an implementation of a method for unlocking a fingerprint according to a fourth embodiment of the present application, which is detailed as follows:
in S241, if it is detected that the fingerprint identification area has a pressing operation in the screen lock state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S242, a fingerprint matching result of the fingerprint information with a standard fingerprint is obtained.
In S243, if the fingerprint matching result is a matching failure, the screen locking state is maintained.
In S244, if the fingerprint matching result is a successful match, a false touch recognition result is generated according to the unlocking state data recorded in the historical unlocking process and the device state data.
In S245, if the false touch recognition result is a false touch operation, the screen locking state is maintained.
In S246, if the false touch recognition result is a non-false touch operation, an unlocking operation is performed.
Further, as another embodiment of the present application, after S246, the method further includes:
in S2461, the unlock state data corresponding to the unlock operation is generated, and the unlock state data is used to determine a false touch recognition result.
In the embodiment of the application, when a user presses a fingerprint identification area, the electronic device acquires fingerprint information and also acquires device state data corresponding to the pressing operation moment, and when the fingerprint information is detected to be matched with a standard fingerprint, the device state data is compared with unlocking state data corresponding to a conventional unlocking process of the user, and a false touch identification result is obtained based on the comparison result, so that the identification of a false touch event is realized, and when the false touch operation is determined, a screen locking state is maintained, the possibility of false operation is reduced, and the use experience of the user is improved.
Compared with the first embodiment, the embodiment performs the fingerprint identification process, and performs the false touch identification operation after the fingerprint matching is successful. Since the response speed of the fingerprint recognition operation is faster and the calculation amount is smaller than that of the false touch recognition operation, the unlock state can be directly maintained when the fingerprint matching fails without performing the false touch recognition operation with a large calculation amount or waiting for the result of the false touch recognition operation, thereby reducing the unnecessary calculation amount.
Example five:
different from the fourth embodiment, in the present embodiment, the manner of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is specifically as follows: and determining the unlocking probability of the intentional unlocking operation of the user at this time by counting the number of unlocking state data matched with the collected equipment state data at this time, and obtaining a false touch recognition result based on the unlocking probability.
Fig. 25 shows a flowchart of an implementation of a method for unlocking a fingerprint according to a fifth embodiment of the present application, which is detailed as follows:
in S251, if it is detected that the fingerprint identification area has a pressing operation in the screen lock state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S252, a fingerprint matching result of the fingerprint information with a standard fingerprint is obtained.
In S253, if the fingerprint matching result is a matching failure, the lock screen state is maintained.
In S254, if the fingerprint matching result is that the matching is successful, the matching number of the unlock state data matching the device state data is counted from the unlock state data of all the historical unlock operations.
In S255, an unlocking probability is determined based on the matching number, and the false touch recognition result is obtained according to the unlocking probability and a preset unlocking determination threshold.
In S256, if the false touch recognition result is a false touch operation, the screen lock state is maintained.
Further, as another embodiment of the present application, S256 may specifically include:
in S2563, if the unlocking probability is smaller than the unlocking determination threshold, unlocking prompt information is output.
In S2564, if the first touch operation matching the unlocking prompt information is not received within the preset effective response time, the screen locking state is maintained.
In S2565, if a first touch operation matching the unlocking prompt information is received within the valid response time, an unlocking operation is performed.
Further, as another embodiment of the present application, before S2563, the method further includes:
in S2561, a last historical press time corresponding to a historical press operation successfully matched with the standard fingerprint is acquired, and a press interval is determined based on the historical press time and the press operation time.
In S2562, the unlock determination threshold is configured based on the pressing interval.
In S257, if the false touch recognition result is a non-false touch operation, the unlocking operation is performed.
Further, as another embodiment of the present application, after S257, the method further includes:
in S2571, the unlock state data corresponding to the unlock operation is generated, and the unlock state data is used to determine a false touch recognition result.
Further, as another embodiment of the present application, after S2571, the method further includes:
in S2572, a second touch operation initiated by the user on the electronic device is monitored, and the valid identifier corresponding to the unlock state data is configured based on the second touch operation.
Note that S2563 to S2565 are for determining the unlocking intention of the user; and step S2572 is also for determining the user' S unlocking intention. I.e. the two embodiments described above need to achieve similar technical effects. Therefore, if S256 is implemented by using the methods of S2563 to S2565 in the second embodiment, S2572 may not be included after S257; if S2572 is included after S257 in the second embodiment, S256 may be implemented without using S2563 to S2565.
Further, as another embodiment of the present application, after S2532, the method may further include:
in S2533, if the valid identifier of the unlock state data is the first bit value, performing a screen lock operation; and when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data.
In the embodiment of the application, the matching number between the acquired equipment state data and the unlocking state data of historical unlocking operation is counted, so that whether the habit of pressing the fingerprint identification area is consistent with the historical unlocking behavior or not can be judged, whether the pressing operation is mistaken touch operation or not is identified, the mistaken touch identification is identified, the screen locking state is kept when the mistaken touch operation is determined, the misoperation of a user is avoided, and the use experience of the user is improved.
Example six:
different from the fourth embodiment, in the present embodiment, the manner of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is specifically as follows: and training the obtained mistaken touch recognition model according to the unlocking state data recorded in all historical unlocking processes, and importing the obtained equipment state data into the mistaken touch recognition model so as to output a mistaken touch recognition result.
Fig. 26 shows a flowchart of an implementation of a method for unlocking a fingerprint according to a sixth embodiment of the present application, which is detailed as follows:
in S261, if it is detected that the fingerprint identification area has a pressing operation in the screen lock state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S262, a fingerprint matching result of the fingerprint information with a standard fingerprint is obtained.
In S263, if the fingerprint matching result is a matching failure, the screen locking state is maintained.
In S264, if the fingerprint matching result is a successful match, importing the device state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
In S265, if the false touch recognition result is a false touch operation, the screen lock state is maintained.
Further, as another embodiment of the present application, if the false touch recognition result includes an unlocking probability, S265 specifically includes:
in S2653, if the unlocking probability is smaller than the unlocking determination threshold, unlocking prompt information is output.
At S2654, if the first touch operation matched with the unlocking prompt information is not received within the preset effective response time, the screen locking state is maintained.
At S2655, if the first touch operation matched with the unlocking prompt information is received within the valid response time, an unlocking operation is performed.
Further, as another embodiment of the present application, before S2653, the method further includes:
in S2651, a last historical pressing time corresponding to the historical pressing operation successfully matched with the standard fingerprint is acquired, and a pressing interval is determined based on the historical pressing time and the pressing operation time.
In S2652, the unlock determination threshold is configured based on the pressing interval.
In S266, if the false touch recognition result is a non-false touch operation, an unlocking operation is performed.
Further, as another embodiment of the present application, after S266, the method further includes:
in S2661, the unlocking state data corresponding to the unlocking operation is generated, and the unlocking state data is used to train the false touch recognition model.
Further, as another embodiment of the present application, after S2661, the method further includes:
in S2662, a second touch operation initiated by the user on the electronic device is monitored, and the valid identifier corresponding to the unlock state data is configured based on the second touch operation.
Note that S2653 to S2655 are for determining the unlocking intention of the user; and step S2662 is also for determining the unlocking intention of the user. I.e. the two embodiments described above need to achieve similar technical effects. Therefore, if S265 is implemented by specifically employing the methods from S2653 to S2655 in the second embodiment, S2662 may not be included after S266; if S2662 is included after S266 in the second embodiment, S265 may be implemented without using S2653 to S2655.
Further, as another embodiment of the present application, after S2662, the method may further include:
at S2663, if the valid identifier of the unlock state data is the first bit value, performing a screen lock operation; and when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data.
In the embodiment of the application, the matching number between the acquired equipment state data and the unlocking state data of historical unlocking operation is counted, so that whether the habit of pressing the fingerprint identification area is consistent with the historical unlocking behavior or not can be judged, whether the pressing operation is mistaken touch operation or not is identified, the mistaken touch identification is identified, the screen locking state is kept when the mistaken touch operation is determined, the misoperation of a user is avoided, and the use experience of the user is improved.
Example seven:
different from the first embodiment, in the seventh embodiment, the operation of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is performed first, and after the fingerprint matching result is successful, the operation of obtaining the fingerprint matching result of the fingerprint information and the standard fingerprint is performed.
Fig. 27 shows a flowchart of an implementation of a method for unlocking a fingerprint according to a seventh embodiment of the present application, which is detailed as follows:
in S271, if it is detected that the fingerprint identification area has a pressing operation in the lock screen state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S272, a false touch recognition result is generated according to the unlocking state data recorded in the historical unlocking process and the device state data.
In S273, if the false touch recognition result is a false touch operation, the screen lock state is maintained.
In S274, if the false touch recognition result is a non-false touch operation, a fingerprint matching result between the fingerprint information and a standard fingerprint is obtained.
In S275, if the fingerprint matching result is a matching failure, the lock screen state is maintained.
In S276, if the fingerprint matching result is a successful match, an unlocking operation is performed.
Further, as another embodiment of the present application, after S276, the method further includes:
in S2761, the unlock state data corresponding to the unlock operation is generated, and the unlock state data is used to determine a false touch recognition result.
In the embodiment of the application, when a user presses a fingerprint identification area, the electronic device acquires fingerprint information and also acquires device state data corresponding to the pressing operation moment, and when the fingerprint information is detected to be matched with a standard fingerprint, the device state data is compared with unlocking state data corresponding to a conventional unlocking process of the user, and a false touch identification result is obtained based on the comparison result, so that the identification of a false touch event is realized, and when the false touch operation is determined, a screen locking state is maintained, the possibility of false operation is reduced, and the use experience of the user is improved.
Compared with the first embodiment, the embodiment performs the false touch recognition operation, and executes the fingerprint recognition process after determining that the false touch operation is not performed, and does not need to execute the fingerprint recognition and the false touch recognition for any pressing operation, thereby reducing unnecessary fingerprint recognition operation and reducing resource consumption in the unlocking process.
Example eight:
different from the seventh embodiment, in the present embodiment, the manner of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is specifically as follows: and determining the unlocking probability of the intentional unlocking operation of the user at this time by counting the number of unlocking state data matched with the collected equipment state data at this time, and obtaining a false touch recognition result based on the unlocking probability.
Fig. 28 shows a flowchart of an implementation of a method for unlocking a fingerprint according to an eighth embodiment of the present application, which is detailed as follows:
in S281, if it is detected that the fingerprint identification area has a pressing operation in the lock screen state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S282, the number of matches of the unlock state data with the device state data is counted from the unlock state data of all the historical unlock operations.
In S283, an unlocking probability is determined based on the matching number, and the false touch recognition result is obtained according to the unlocking probability and a preset unlocking determination threshold.
In S284, if the false touch recognition result is a false touch operation, the screen locking state is maintained.
Further, as another embodiment of the present application, S284 may specifically include:
in S2843, if the unlocking probability is smaller than the unlocking determination threshold, unlocking prompt information is output.
In S2844, if the first touch operation matched with the unlocking prompt information is not received within the preset effective response time, the screen locking state is maintained.
In S2845, if the first touch operation matched with the unlocking prompt information is received within the valid response time, a fingerprint matching result of the fingerprint information and a standard fingerprint is obtained.
In this embodiment, the electronic device receives the first touch operation matched with the unlocking prompt message within the effective response time, so that the fingerprint information can be matched with the standard fingerprint, and the electronic device can be directly unlocked after the fingerprint matching result which is successfully matched is obtained; on the contrary, if the fingerprint information is not matched with the standard fingerprint, a matching result of fingerprint matching failure can be obtained, and the electronic equipment is maintained in an unlocked state.
In a possible implementation manner, when the electronic device detects that the fingerprint matching fails, the electronic device may output fingerprint identification failure information on the touch screen to prompt the user to re-acquire the fingerprint information, and turn off the touch screen again after lighting for a preset time. Because the touch screen of the electronic device can be in the bright screen state when the first touch operation is collected, if the screen locking state of the electronic device is directly maintained, the user cannot determine that the touch operation is not matched with the unlocking prompt information or the fingerprint identification is wrong. Based on this, the electronic device can output fingerprint identification failure information to prompt the user to re-acquire fingerprint information.
Illustratively, fig. 29 shows a schematic diagram of fingerprint matching failure provided by an embodiment of the present application. Referring to fig. 29, the electronic device lights up the touch screen, and outputs unlocking prompt information, that is, "slide up to unlock" on the touch screen, and the user initiates a first touch operation of sliding up in the effective response time, at this time, the electronic device matches the fingerprint information collected in S281 with the standard fingerprint, and detects that the two are not matched, and therefore, outputs "fingerprint matching failure" information on the touch screen to prompt the user to collect the fingerprint information again.
As another embodiment of the application, if the electronic device detects that the first touch operation is matched with the unlocking prompt information and detects that the user initiates another pressing operation again in the fingerprint identification area within the preset screen lighting time, the fingerprint information is obtained again, the fingerprint information is matched with the standard fingerprint to obtain a fingerprint matching result, and the unlocking state data does not need to be collected again and the mistaken touch identification operation does not need to be carried out.
Further, as another embodiment of the present application, before S2843, the method further includes:
in S2841, a last historical pressing time corresponding to the historical pressing operation successfully matched with the standard fingerprint is acquired, and a pressing interval is determined based on the historical pressing time and the pressing operation time.
In S2842, the unlock determination threshold is configured based on the pressing interval.
In S285, if the false touch recognition result is a non-false touch operation, a fingerprint matching result between the fingerprint information and the standard fingerprint is obtained.
In S286, if the fingerprint matching result is a matching failure, maintaining the lock screen state
In S287, if the fingerprint matching result is a successful match, an unlocking operation is performed.
Further, as another embodiment of the present application, after S287, the method further includes:
in S2871, the unlock state data corresponding to the unlock operation is generated, and the unlock state data is used to determine a false touch recognition result.
Further, as another embodiment of the present application, after S2871, the method further includes:
in S2872, a second touch operation initiated by the user on the electronic device is monitored, and the valid identifier corresponding to the unlocking state data is configured based on the second touch operation.
It should be noted that S2843 to S2845 are used for determining the unlocking intention of the user; and step S2872 is also for determining the unlocking intention of the user. I.e. the two embodiments described above need to achieve similar technical effects. Therefore, if S284 in the second embodiment is implemented by using the methods of S2843 to S2845, S2872 may not be included after S286; if S2872 is included after S287 in the second embodiment, S284 may be implemented without using S2843 to S2845.
Further, as another embodiment of the present application, after S2872, the method may further include:
at S2873, if the valid identifier of the unlock state data is the first bit value, performing a screen lock operation; and when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data.
In the embodiment of the application, the matching number between the acquired equipment state data and the unlocking state data of historical unlocking operation is counted, so that whether the habit of pressing the fingerprint identification area is consistent with the historical unlocking behavior or not can be judged, whether the pressing operation is mistaken touch operation or not is identified, the mistaken touch identification is identified, the screen locking state is kept when the mistaken touch operation is determined, the misoperation of a user is avoided, and the use experience of the user is improved.
Example nine:
different from the seventh embodiment, in the present embodiment, the manner of generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data is specifically as follows: and training the obtained mistaken touch recognition model according to the unlocking state data recorded in all historical unlocking processes, and importing the obtained equipment state data into the mistaken touch recognition model so as to output a mistaken touch recognition result.
Fig. 30 shows a flowchart of an implementation of a method for unlocking a fingerprint according to a ninth embodiment of the present application, which is detailed as follows:
in S301, if it is detected that the fingerprint identification area has a pressing operation in the screen lock state, device state data and fingerprint information corresponding to the electronic device at the time of the pressing operation are obtained.
In S302, importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
In S303, if the false touch recognition result is a false touch operation, the screen locking state is maintained.
Further, as another embodiment of the present application, if the false touch recognition result includes an unlocking probability, S303 specifically includes:
in S3033, if the unlocking probability is smaller than the unlocking determination threshold, unlocking prompt information is output.
At S3034, if the first touch operation matched with the unlocking prompt message is not received within the preset effective response time, the screen locking state is maintained.
At S3035, if the first touch operation matched with the unlocking prompt information is received within the effective response time, a fingerprint matching result of the fingerprint information and a standard fingerprint is obtained.
Further, as another embodiment of the present application, before S3033, the method further includes:
in S3031, the last historical pressing time corresponding to the historical pressing operation successfully matched with the standard fingerprint is acquired, and the pressing interval is determined based on the historical pressing time and the pressing operation time.
In S3032, the unlock determination threshold is configured based on the pressing interval.
In S304, if the false touch recognition result is a non-false touch operation, a fingerprint matching result between the fingerprint information and a standard fingerprint is obtained.
In S305, if the fingerprint matching result is a matching failure, the lock screen state is maintained
In S306, if the fingerprint matching result is a successful match, an unlocking operation is performed.
Further, as another embodiment of the present application, after S306, the method further includes:
in S3061, the unlock state data corresponding to the unlock operation is generated, and the unlock state data is used to determine a false touch recognition result.
Further, as another embodiment of the present application, after S3061, the method further includes:
in S3062, a second touch operation initiated by the user on the electronic device is monitored, and the valid identifier corresponding to the unlock state data is configured based on the second touch operation.
It should be noted that S3033 to S3035 are used for determining the unlocking intention of the user; and step S3062 is also for determining the user' S unlocking intention. I.e. the two embodiments described above need to achieve similar technical effects. Therefore, if S303 is implemented by using the methods S3033 to S3035 in the second embodiment, S3062 may not be included after S306; if S3062 is included after S306 in the second embodiment, S303 may be implemented without S3033 to S3035.
Further, as another embodiment of the present application, after S3062, the method may further include:
at S3063, if the effective identification of the unlocking state data is the first bit value, executing screen locking operation; and when the valid identifier is a first bit value, identifying the unlocking state data as invalid unlocking state data.
In the embodiment of the application, the matching number between the acquired equipment state data and the unlocking state data of historical unlocking operation is counted, so that whether the habit of pressing the fingerprint identification area is consistent with the historical unlocking behavior or not can be judged, whether the pressing operation is mistaken touch operation or not is identified, the mistaken touch identification is identified, the screen locking state is kept when the mistaken touch operation is determined, the misoperation of a user is avoided, and the use experience of the user is improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Fig. 31 shows a structural block diagram of a device for unlocking a fingerprint provided in an embodiment of the present application, corresponding to the method for unlocking a fingerprint described in the foregoing embodiments one to three, and only shows portions related to the embodiment of the present application for convenience of description.
Referring to fig. 31, the fingerprint unlocking apparatus includes:
a first device statusdata obtaining unit 311, configured to, if it is detected that a pressing operation exists in the fingerprint identification area in the screen lock state, obtain device status data and fingerprint information corresponding to the electronic device at the time of the pressing operation;
an unlockingidentification unit 312, configured to obtain a fingerprint matching result between the fingerprint information and a standard fingerprint, and generate a false touch identification result according to unlocking state data recorded in a historical unlocking process and the device state data;
the first falsetouch response unit 313 is configured to maintain the screen locking state if the fingerprint matching result is a successful match and the false touch identification result is a false touch operation.
Optionally, the fingerprint unlocking apparatus further includes:
and the first unlocking operation response unit is used for executing unlocking operation if the fingerprint matching result is successful in matching and the false touch identification result is non-false touch operation.
Optionally, the fingerprint unlocking device includes:
and the first unlocking state data generating unit is used for generating unlocking state data corresponding to the unlocking operation, and the unlocking state data is used for determining the false touch recognition result.
Optionally, the fingerprint unlocking apparatus further includes:
the first valid data identification unit is used for acquiring a second touch operation initiated by a user on the electronic equipment and configuring a valid identifier corresponding to the unlocking state data based on the second touch operation; the valid identification is used for: and if the effective identification of the unlocking state data is a preset bit value, the unlocking state data is used for determining the false touch recognition result.
Optionally, the fingerprint unlocking apparatus further includes:
and the first invalid unlocking trigger unit is used for executing the screen locking operation if the valid identifier of the unlocking state data is a first bit value.
Optionally, the fingerprint unlocking device further includes:
and the first fingerprint matching failure unit is used for maintaining the screen locking state if the fingerprint matching result is matching failure.
Optionally, the unlock identifying unit 232 includes:
the first matching number counting unit is used for counting the matching number of the unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and the first unlocking probability comparison unit is used for determining the unlocking probability based on the matching number and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
Optionally, the fingerprint unlocking apparatus further includes:
a first pressing interval acquisition unit configured to acquire a historical pressing time corresponding to a historical pressing operation for which the standard fingerprint is successfully matched, and determine a pressing interval based on the historical pressing time and the pressing operation time;
a first unlock determination threshold value configuration unit configured to configure the unlock determination threshold value based on the pressing interval.
Optionally, theunlock identifying unit 312 includes:
the first false touch recognition model importing unit is used for importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
Optionally, theunlock recognition unit 312 includes:
the first unlocking prompt output unit is used for outputting unlocking prompt information;
and the first operation timeout unit is used for maintaining the screen locking state if a first touch operation matched with the unlocking prompt message is not received within a preset effective response time.
Optionally, the fingerprint unlocking apparatus further includes:
and the first operation receiving unit is used for executing unlocking operation if a first touch operation matched with the unlocking prompt information is received in the effective response time.
Corresponding to the method for unlocking a fingerprint described in the fourth to sixth embodiments above, fig. 32 shows a structural block diagram of a device for unlocking a fingerprint provided in an embodiment of the present application, and for convenience of explanation, only the parts related to the embodiment of the present application are shown.
Referring to fig. 32, the fingerprint unlocking apparatus includes:
a second device statusdata obtaining unit 321, configured to, if it is detected that a pressing operation exists in the fingerprint identification area in the screen lock state, obtain device status data and fingerprint information corresponding to the electronic device at the time of the pressing operation;
a firstfingerprint identification unit 322, configured to obtain a fingerprint matching result of the fingerprint information with a standard fingerprint;
the first falsetouch recognition unit 323 is used for generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the equipment state data if the fingerprint matching result is that matching is successful;
the second falsetouch response unit 324 is configured to maintain the screen locking state if the false touch recognition result is a false touch operation.
Optionally, the fingerprint unlocking apparatus further includes:
and the second unlocking operation response unit is used for executing the unlocking operation if the false touch identification result is the non-false touch operation.
Optionally, the fingerprint unlocking apparatus further includes:
and the second unlocking state data generating unit is used for generating unlocking state data corresponding to the unlocking operation, and the unlocking state data is used for determining the false touch recognition result.
Optionally, the fingerprint unlocking apparatus further includes:
the second valid data identification unit is used for acquiring a second touch operation initiated by a user on the electronic equipment and configuring a valid identifier corresponding to the unlocking state data based on the second touch operation; the valid identification is used for: and if the effective identification of the unlocking state data is a preset bit value, the unlocking state data is used for determining the false touch recognition result.
Optionally, the fingerprint unlocking apparatus further includes:
and the second invalid unlocking trigger unit is used for executing screen locking operation if the valid identifier of the unlocking state data is the first bit value.
Optionally, the fingerprint unlocking device further includes:
and the second fingerprint matching failure unit is used for maintaining the screen locking state if the fingerprint matching result is matching failure.
Optionally, the first falsetouch recognition unit 323 includes:
the second matching number counting unit is used for counting the matching number of the unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and the second unlocking probability comparison unit is used for determining the unlocking probability based on the matching number and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
Optionally, the fingerprint unlocking apparatus further includes:
a second pressing interval acquisition unit configured to acquire a history pressing time corresponding to a history pressing operation for which the standard fingerprint is successfully matched, and determine a pressing interval based on the history pressing time and the pressing operation time;
a second unlocking determination threshold value configuration unit configured to configure the unlocking determination threshold value based on the pressing interval.
Optionally, the first false touch recognition unit includes:
the second false touch recognition model importing unit is used for importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
Optionally, the first falsetouch recognition unit 323 includes:
the second unlocking prompt output unit is used for outputting unlocking prompt information;
and the second operation timeout unit is used for maintaining the screen locking state if the first touch operation matched with the unlocking prompt message is not received within the preset effective response time.
Optionally, the fingerprint unlocking apparatus further includes:
and the second operation receiving unit is used for executing unlocking operation if the first touch operation matched with the unlocking prompt information is received within the effective response time.
Corresponding to the method for unlocking a fingerprint described in the seventh to ninth embodiments above, fig. 33 shows a structural block diagram of the device for unlocking a fingerprint provided in the embodiment of the present application, and for convenience of explanation, only the parts related to the embodiment of the present application are shown.
Referring to fig. 33, the fingerprint unlocking apparatus includes:
a third device status data obtaining unit 331, configured to, if it is detected that a pressing operation exists in the fingerprint identification area in the screen lock state, obtain device status data and fingerprint information corresponding to the electronic device at the time of the pressing operation;
the second false touch recognition unit 332 is configured to generate a false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data if the fingerprint matching result is that matching is successful;
and a third falsetouch response unit 333, configured to maintain the screen locking state if the false touch recognition result is a false touch operation.
Optionally, the fingerprint unlocking apparatus further includes:
the second fingerprint identification unit is used for obtaining a fingerprint matching result of the fingerprint information and a standard fingerprint if the false touch identification result is a non-false touch operation;
and the third unlocking operation response unit is used for executing unlocking operation if the fingerprint matching result is that matching is successful.
Optionally, the fingerprint unlocking apparatus further includes:
and the third unlocking state data generating unit is used for generating unlocking state data corresponding to the unlocking operation, and the unlocking state data is used for determining the false touch recognition result.
Optionally, the fingerprint unlocking apparatus further includes:
the third valid data identification unit is used for acquiring a second touch operation initiated by a user on the electronic equipment and configuring a valid identifier corresponding to the unlocking state data based on the second touch operation; the valid identification is used for: and if the effective identification of the unlocking state data is a preset bit value, the unlocking state data is used for determining the false touch recognition result.
Optionally, the fingerprint unlocking apparatus further includes:
and the third invalid unlocking trigger unit is used for executing screen locking operation if the valid identifier of the unlocking state data is the first bit value.
Optionally, the fingerprint unlocking device further includes:
and the second fingerprint matching failure unit is used for maintaining the screen locking state if the fingerprint matching result is matching failure.
Optionally, the fingerprint unlocking device further includes:
the third unlocking prompt output unit is used for outputting unlocking prompt information;
and the third operation timeout unit is used for maintaining the screen locking state if the first touch operation matched with the unlocking prompt message is not received within the preset effective response time.
Optionally, the fingerprint unlocking apparatus further includes:
and the second operation receiving unit is used for executing unlocking operation if the first touch operation matched with the unlocking prompt information is received within the effective response time.
Optionally, the second false touch recognition unit 332 includes:
the third matching number counting unit is used for counting the matching number of the unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and the third unlocking probability comparison unit is used for determining the unlocking probability based on the matching number and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
Optionally, the fingerprint unlocking apparatus further includes:
a third pressing interval acquisition unit configured to acquire a historical pressing time corresponding to a historical pressing operation that the standard fingerprint is successfully matched with, and determine a pressing interval based on the historical pressing time and the pressing operation time;
a third unlocking determination threshold value configuration unit configured to configure the unlocking determination threshold value based on the pressing interval.
Optionally, the second false touch recognition unit 332 includes:
the third false touch recognition model importing unit is used for importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
Therefore, any one of the fingerprint unlocking devices provided in the embodiments of the present application can also obtain the fingerprint information while the user presses the fingerprint identification area, and also obtain the device state data corresponding to the pressing operation time, and compare the device state data with the unlocking state data corresponding to the conventional unlocking process of the user, and obtain the false touch identification result based on the comparison result, thereby realizing the identification of the false touch event, and maintaining the screen locking state when the false touch operation is determined, reducing the possibility of the false operation, and improving the use experience of the user.
Fig. 34 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 34, theelectronic apparatus 34 of this embodiment includes: at least one processor 340 (only one shown in fig. 34), amemory 341, and acomputer program 342 stored in thememory 341 and operable on the at least oneprocessor 340, wherein theprocessor 340 implements the steps in any of the above-described respective fingerprint unlocking method embodiments when thecomputer program 342 is executed by theprocessor 340.
Theelectronic device 34 may be a computing device such as a desktop computer, a notebook, a palm computer, and a cloud server. The electronic device may include, but is not limited to, aprocessor 340, amemory 341. Those skilled in the art will appreciate that fig. 34 is merely an example of theelectronic device 34, and does not constitute a limitation of theelectronic device 34, and may include more or less components than those shown, or combine some of the components, or different components, such as input output devices, network access devices, etc.
TheProcessor 340 may be a Central Processing Unit (CPU), and theProcessor 340 may also be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Thestorage 341 may be an internal storage unit of theelectronic device 34 in some embodiments, for example, a hard disk or a memory of theelectronic device 34. Thememory 341 may also be an external storage device of theelectronic device 34 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on theelectronic device 34. Further, thememory 341 may also include both an internal storage unit and an external storage device of theelectronic device 34. Thememory 341 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. Thememory 341 may also be used to temporarily store data that has been output or is to be output.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
An embodiment of the present application further provides a network device, where the network device includes: at least one processor, a memory, and a computer program stored in the memory and executable on the at least one processor, the processor implementing the steps of any of the various method embodiments described above when executing the computer program.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/electronic device, a recording medium, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), an electrical carrier signal, a telecommunications signal, and a software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other ways. For example, the above-described apparatus/network device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (32)

1. A fingerprint unlocking method is applied to electronic equipment and is characterized by comprising the following steps:
if the fingerprint identification area is detected to have pressing operation in the screen locking state, acquiring equipment state data and fingerprint information corresponding to the electronic equipment at the moment of pressing operation;
acquiring a fingerprint matching result of the fingerprint information and a standard fingerprint, and generating a false touch identification result according to unlocking state data recorded in a historical unlocking process and the equipment state data;
and if the fingerprint matching result is successful matching and the false touch identification result is false touch operation, maintaining the screen locking state.
2. The method according to claim 1, further comprising, after obtaining a fingerprint matching result of the fingerprint information with a standard fingerprint, and generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the device state data:
and if the fingerprint matching result is successful in matching and the false touch identification result is non-false touch operation, executing unlocking operation.
3. The method according to claim 2, wherein after the fingerprint matching result is a successful match and the false touch recognition result is a non-false touch operation, the method further comprises:
and generating unlocking state data corresponding to the unlocking operation, wherein the unlocking state data is used for determining the false touch recognition result.
4. The method of claim 3, further comprising, after the generating the unlock state data corresponding to the unlock operation:
acquiring touch operation initiated by a user on terminal equipment, and configuring an effective identifier corresponding to the unlocking state data based on the touch operation; the valid identification is used for: and if the effective identification of the unlocking state data is a preset bit value, the unlocking state data is used for determining the false touch recognition result.
5. The method according to claim 4, wherein after obtaining a touch operation initiated by a user on a terminal device and configuring a valid identifier corresponding to the unlock state data based on the touch operation, the method further comprises:
and if the effective identifier of the unlocking state data is the first bit value, executing screen locking operation.
6. The method of claim 4, wherein the touch operation comprises: a slide operation, a click operation, or a long press operation.
7. The method according to claim 1, wherein the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data comprises:
counting the matching number of unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and determining an unlocking probability based on the matching number, and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
8. The method of claim 7, wherein before counting the number of matches of unlocking state data that match the device state data from among the unlocking state data of all the historical unlocking operations, the method further comprises:
acquiring historical pressing time corresponding to historical pressing operation successfully matched with the standard fingerprint, and determining a pressing interval based on the historical pressing time and the pressing operation time;
configuring the unlock determination threshold based on the press interval.
9. The method according to claim 1, wherein the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data comprises:
importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
10. The method of claim 1, wherein the device state data comprises: an ambient light intensity value and a placement state of the electronic device;
the method for generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the equipment state data comprises the following steps:
if the ambient light intensity value is smaller than a preset light intensity threshold value and the placement state of the electronic equipment is a preset state, recognizing that the electronic equipment is in an idle scene, and outputting the false touch recognition result of false touch operation; the idle scenario includes: an idle scene placed in a pocket and an idle scene placed in a bag.
11. A fingerprint unlocking method is applied to electronic equipment and is characterized by comprising the following steps:
if the fingerprint identification area is detected to have pressing operation in the screen locking state, acquiring equipment state data and fingerprint information corresponding to the electronic equipment at the moment of pressing operation;
obtaining a fingerprint matching result of the fingerprint information and a standard fingerprint;
if the fingerprint matching result is successful, generating a false touch identification result according to unlocking state data recorded in the historical unlocking process and the equipment state data;
and if the false touch recognition result is false touch operation, maintaining the screen locking state.
12. The method according to claim 11, wherein after generating a false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data if the fingerprint matching result is a successful matching, the method further comprises:
and if the false touch identification result is the non-false touch operation, executing the unlocking operation.
13. The method according to claim 12, further comprising, after the performing an unlocking operation if the false touch recognition result is a non-false touch operation:
and generating unlocking state data corresponding to the unlocking operation, wherein the unlocking state data is used for determining the false touch recognition result.
14. The method of claim 13, further comprising, after the generating the unlock state data corresponding to the unlock operation:
acquiring touch operation initiated by a user on terminal equipment, and configuring an effective identifier corresponding to the unlocking state data based on the touch operation; the valid identification is used for: and if the effective identification of the unlocking state data is a preset bit value, the unlocking state data is used for determining the false touch recognition result.
15. The method according to claim 14, wherein after obtaining a touch operation initiated by a user on a terminal device and configuring a valid identifier corresponding to the unlock state data based on the touch operation, the method further comprises:
and if the effective identifier of the unlocking state data is the first bit value, executing screen locking operation.
16. The method of claim 14, wherein the touch operation comprises: a slide operation, a click operation, or a long press operation.
17. The method according to claim 11, wherein the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data comprises:
counting the matching number of unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and determining an unlocking probability based on the matching number, and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
18. The method of claim 17, wherein before counting the number of matches of unlocking state data that match the device state data from among the unlocking state data of all historical unlocking operations, the method further comprises:
acquiring historical pressing time corresponding to historical pressing operation successfully matched with the standard fingerprint, and determining a pressing interval based on the historical pressing time and the pressing operation time;
configuring the unlock determination threshold based on the press interval.
19. The method according to claim 11, wherein the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data comprises:
importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
20. The method of claim 11, wherein the device status data comprises: an ambient light intensity value and a placement state of the electronic device;
the method for generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the equipment state data comprises the following steps:
if the ambient light intensity value is smaller than a preset light intensity threshold value and the placement state of the electronic equipment is a preset state, recognizing that the electronic equipment is in an idle scene, and outputting the false touch recognition result of false touch operation; the idle scenario includes: an idle scene placed in a pocket and an idle scene placed in a bag.
21. A fingerprint unlocking method is applied to electronic equipment and is characterized by comprising the following steps:
if the fingerprint identification area is detected to have pressing operation in the screen locking state, acquiring equipment state data and fingerprint information corresponding to the electronic equipment at the moment of pressing operation;
generating a false touch recognition result according to unlocking state data recorded in a historical unlocking process and the equipment state data;
and if the false touch recognition result is false touch operation, maintaining the screen locking state.
22. The method according to claim 21, further comprising, after generating a false touch recognition result according to the unlock state data recorded in the historical unlock process and the device state data:
if the false touch identification result is non-false touch operation, obtaining a fingerprint matching result of the fingerprint information and a standard fingerprint;
and if the fingerprint matching result is that the matching is successful, executing unlocking operation.
23. The method of claim 22, further comprising, after the performing an unlocking operation if the fingerprint matching result is a successful matching, the method further comprising:
and generating unlocking state data corresponding to the unlocking operation, wherein the unlocking state data is used for determining the false touch recognition result.
24. The method of claim 23, further comprising, after the generating the unlock state data corresponding to the unlock operation:
acquiring touch operation initiated by a user on terminal equipment, and configuring an effective identifier corresponding to the unlocking state data based on the touch operation; the valid identification is used for: and if the effective identification of the unlocking state data is a preset bit value, the unlocking state data is used for determining the false touch recognition result.
25. The method according to claim 24, wherein after obtaining a touch operation initiated by a user on a terminal device and configuring a valid identifier corresponding to the unlock state data based on the touch operation, the method further comprises:
and if the effective identifier of the unlocking state data is the first bit value, executing screen locking operation.
26. The method of claim 24, wherein the touch operation comprises: a slide operation, a click operation, or a long press operation.
27. The method according to any one of claims 21 to 26, wherein the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data comprises:
counting the matching number of unlocking state data matched with the equipment state data from the unlocking state data of all historical unlocking operations;
and determining an unlocking probability based on the matching number, and obtaining the false touch recognition result according to the unlocking probability and a preset unlocking judgment threshold value.
28. The method of claim 27, wherein before counting the number of matches of unlocking state data that match the device state data from among the unlocking state data of all historical unlocking operations, the method further comprises:
acquiring historical pressing time corresponding to historical pressing operation successfully matched with the standard fingerprint, and determining a pressing interval based on the historical pressing time and the pressing operation time;
configuring the unlock determination threshold based on the press interval.
29. The method according to any one of claims 21 to 26, wherein the generating of the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the device state data comprises:
importing the equipment state data into a preset false touch recognition model to obtain a false touch recognition result; the false touch recognition model is obtained based on the unlocking state data training.
30. The method of claim 21, wherein the device status data comprises: an ambient light intensity value and a placement state of the electronic device;
the method for generating the false touch recognition result according to the unlocking state data recorded in the historical unlocking process and the equipment state data comprises the following steps:
if the ambient light intensity value is smaller than a preset light intensity threshold value and the placement state of the electronic equipment is a preset state, recognizing that the electronic equipment is in an idle scene, and outputting the false touch recognition result of false touch operation; the idle scenario includes: an idle scene placed in a pocket and an idle scene placed in a bag.
31. An electronic device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 30 when executing the computer program.
32. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 30.
CN202010710835.1A2020-07-222020-07-22Fingerprint unlocking method and device, terminal and storage mediumPendingCN113971271A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010710835.1ACN113971271A (en)2020-07-222020-07-22Fingerprint unlocking method and device, terminal and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010710835.1ACN113971271A (en)2020-07-222020-07-22Fingerprint unlocking method and device, terminal and storage medium

Publications (1)

Publication NumberPublication Date
CN113971271Atrue CN113971271A (en)2022-01-25

Family

ID=79584867

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010710835.1APendingCN113971271A (en)2020-07-222020-07-22Fingerprint unlocking method and device, terminal and storage medium

Country Status (1)

CountryLink
CN (1)CN113971271A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114895836A (en)*2022-07-142022-08-12深圳市智汉科技有限公司Touch control method and device based on intelligent full-flow data touch screen and electronic equipment
CN115291786A (en)*2022-09-302022-11-04深圳市广和通无线通信软件有限公司False touch judgment method and device based on machine learning and storage medium
CN116704560A (en)*2022-09-292023-09-05荣耀终端有限公司Fingerprint identification method and electronic equipment
WO2025138884A1 (en)*2023-12-262025-07-03荣耀终端股份有限公司Fingerprint recognition method and electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180088723A1 (en)*2016-09-272018-03-29Chiun Mai Communication Systems, Inc.Electronic device and method for controlling the same
CN107888768A (en)*2017-10-312018-04-06努比亚技术有限公司One kind solution lock control method, terminal and computer-readable recording medium
CN108182000A (en)*2017-12-252018-06-19科大讯飞股份有限公司Keyboard input detection method and device, storage medium and electronic equipment
CN108345781A (en)*2018-02-132018-07-31北京小米移动软件有限公司Unlocked by fingerprint method and device
CN108363914A (en)*2018-01-312018-08-03维沃移动通信有限公司 Fingerprint unlocking control method and device
CN110058777A (en)*2019-03-132019-07-26华为技术有限公司The method and electronic equipment of shortcut function starting

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180088723A1 (en)*2016-09-272018-03-29Chiun Mai Communication Systems, Inc.Electronic device and method for controlling the same
CN107888768A (en)*2017-10-312018-04-06努比亚技术有限公司One kind solution lock control method, terminal and computer-readable recording medium
CN108182000A (en)*2017-12-252018-06-19科大讯飞股份有限公司Keyboard input detection method and device, storage medium and electronic equipment
CN108363914A (en)*2018-01-312018-08-03维沃移动通信有限公司 Fingerprint unlocking control method and device
CN108345781A (en)*2018-02-132018-07-31北京小米移动软件有限公司Unlocked by fingerprint method and device
CN110058777A (en)*2019-03-132019-07-26华为技术有限公司The method and electronic equipment of shortcut function starting

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙炜程 等: "指纹识别式电子密码锁设计", 《福建电脑》, no. 04, 25 April 2015 (2015-04-25), pages 36 - 38*

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114895836A (en)*2022-07-142022-08-12深圳市智汉科技有限公司Touch control method and device based on intelligent full-flow data touch screen and electronic equipment
CN116704560A (en)*2022-09-292023-09-05荣耀终端有限公司Fingerprint identification method and electronic equipment
CN115291786A (en)*2022-09-302022-11-04深圳市广和通无线通信软件有限公司False touch judgment method and device based on machine learning and storage medium
WO2025138884A1 (en)*2023-12-262025-07-03荣耀终端股份有限公司Fingerprint recognition method and electronic device

Similar Documents

PublicationPublication DateTitle
CN110134316B (en)Model training method, emotion recognition method, and related device and equipment
CN113645351A (en)Application interface interaction method, electronic device and computer-readable storage medium
US20240291685A1 (en)Home Device Control Method, Terminal Device, and Computer-Readable Storage Medium
CN111258700B (en) Icon management method and intelligent terminal
CN113168257B (en)Method for locking touch operation and electronic equipment
CN113971271A (en)Fingerprint unlocking method and device, terminal and storage medium
CN113805487B (en)Control instruction generation method and device, terminal equipment and readable storage medium
CN114253349B (en) A folding device and an opening and closing control method thereof
CN113641271B (en)Application window management method, terminal device and computer readable storage medium
CN113573390A (en) Antenna power adjustment method, terminal device and storage medium
CN113391775A (en)Man-machine interaction method and equipment
CN113709304A (en)Intelligent reminding method and equipment
CN114064571A (en)Method, device and terminal for determining file storage position
WO2021000943A1 (en)Method and apparatus for managing fingerprint switch
WO2023130931A1 (en)Service anomaly warning method, electronic device and storage medium
CN114201738B (en) Unlocking method and electronic device
CN111249728B (en) An image processing method, device and storage medium
CN111431968B (en)Cross-device distribution method of service elements, terminal device and storage medium
CN110058729B (en) Method and electronic device for adjusting the sensitivity of touch detection
CN112740148A (en) A method and electronic device for inputting information into an input box
CN115273216A (en)Target motion mode identification method and related equipment
CN114035989A (en)Card death recognition method and electronic equipment
CN114943976B (en)Model generation method and device, electronic equipment and storage medium
CN114812381B (en) Positioning method of electronic equipment and electronic equipment
CN115437601A (en) Image sorting method, electronic device, program product and medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp