[go: up one dir, main page]

CN111880848A - Operating system switching method, device, terminal and readable storage medium - Google Patents

Operating system switching method, device, terminal and readable storage medium Download PDF

Info

Publication number
CN111880848A
CN111880848A CN202010679897.0A CN202010679897A CN111880848A CN 111880848 A CN111880848 A CN 111880848A CN 202010679897 A CN202010679897 A CN 202010679897A CN 111880848 A CN111880848 A CN 111880848A
Authority
CN
China
Prior art keywords
fingerprint
terminal
features
operating system
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010679897.0A
Other languages
Chinese (zh)
Inventor
黄新云
房文君
张昊
郑渝宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhutai Defense Intelligent Technology Co ltd
Original Assignee
Shenzhen Zhutai Defense Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhutai Defense Intelligent Technology Co ltd filed Critical Shenzhen Zhutai Defense Intelligent Technology Co ltd
Priority to CN202010679897.0A priority Critical patent/CN111880848A/en
Publication of CN111880848A publication Critical patent/CN111880848A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • G06F9/441Multiboot arrangements, i.e. selecting an operating system to be loaded
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本发明涉及操作系统切换的技术领域,公开了一种操作系统的切换方法、装置、终端以及可读存储介质。其中,该方法包括:获取用户的指纹信息;根据指纹信息解析得到指纹信息的待匹配指纹特征;判断待匹配指纹特征是否为终端预存的指纹特征数据库中的标准指纹特征;若是,获取用户的身份识别信息;根据身份识别信息解析得到身份识别信息的待匹配身份识别特征;判断待匹配身份识别特征是否为终端预存的身份识别特征数据库中的标准身份识别特征;若是,切换终端的操作系统;上述提供的一种操作系统的切换方法,切换方式保密性强,不会暴露终端具有双系统,满足了用户的使用要求。

Figure 202010679897

The present invention relates to the technical field of operating system switching, and discloses an operating system switching method, device, terminal and readable storage medium. The method includes: obtaining fingerprint information of a user; obtaining fingerprint features to be matched of the fingerprint information according to the fingerprint information parsing; judging whether the fingerprint features to be matched are standard fingerprint features in a fingerprint feature database pre-stored in the terminal; if so, obtaining the identity recognition information of the user; obtaining identity recognition features to be matched of the identity recognition information according to the identity recognition information parsing; judging whether the identity recognition features to be matched are standard identity recognition features in an identity recognition feature database pre-stored in the terminal; if so, switching the operating system of the terminal; the above-mentioned operating system switching method has strong confidentiality, will not expose that the terminal has dual systems, and meets the user's usage requirements.

Figure 202010679897

Description

一种操作系统的切换方法、装置、终端以及可读存储介质Operating system switching method, device, terminal and readable storage medium

技术领域technical field

本发明涉及操作系统切换的技术领域,尤其涉及一种操作系统的切换方法、装置、终端以及可读存储介质。The present invention relates to the technical field of operating system switching, and in particular, to a method, device, terminal and readable storage medium for switching operating systems.

背景技术Background technique

随着互联网的高速发展,用户的使用环境也在不断发生改变,为确保用户终端中的重要数据以及隐私文件无法泄露,双系统终端的使用受到了大家的青睐。用户可在双系统中的安全系统中保存重要保密文件,为确保终端的隐私安全提供了条件。With the rapid development of the Internet, users' usage environment is constantly changing. In order to ensure that important data and private files in user terminals cannot be leaked, the use of dual-system terminals is favored by everyone. Users can save important confidential files in the security system in the dual system, which provides conditions for ensuring the privacy and security of the terminal.

现有技术中,双系统终端的切换方式,通常依托于终端中系统切换图标完成,此方法会在用户切换系统时,暴露终端为双系统终端,保密性差,存在一定的安全隐患。In the prior art, the switching method of dual-system terminals is usually completed by relying on the system switching icon in the terminal. This method exposes the terminal as a dual-system terminal when the user switches systems, which has poor confidentiality and has certain security risks.

发明内容SUMMARY OF THE INVENTION

本发明的目的在于提供一种操作系统的切换方法、装置、终端以及可读存储介质,旨在解决现有技术中,双系统终端在依托于终端中系统切换图标完成系统切换时会暴露终端为双系统终端,保密性差的问题。The purpose of the present invention is to provide an operating system switching method, device, terminal and readable storage medium, aiming to solve the problem that in the prior art, when a dual-system terminal completes system switching by relying on the system switching icon in the terminal, the terminal is exposed as a Dual-system terminal, the problem of poor confidentiality.

第一方面,本发明实施例提供了一种操作系统的切换方法,应用于终端,所述终端至少具有可来回切换的第一操作系统和第二操作系统,所述切换方法包括:In a first aspect, an embodiment of the present invention provides a method for switching an operating system, which is applied to a terminal, where the terminal at least has a first operating system and a second operating system that can be switched back and forth, and the switching method includes:

获取用户的指纹信息;Obtain the user's fingerprint information;

根据所述指纹信息解析得到所述指纹信息的待匹配指纹特征;Obtain the fingerprint feature to be matched of the fingerprint information according to the analysis of the fingerprint information;

判断所述待匹配指纹特征是否为所述终端预存的指纹特征数据库中的标准指纹特征;Judging whether the fingerprint feature to be matched is a standard fingerprint feature in the fingerprint feature database pre-stored by the terminal;

若是,获取用户的身份识别信息;If so, obtain the user's identification information;

根据所述身份识别信息解析得到所述身份识别信息的待匹配身份识别特征;Parsing the identification information according to the identification information to obtain the identification features to be matched of the identification information;

判断所述待匹配身份识别特征是否为所述终端预存的身份识别特征数据库中的标准身份识别特征;Judging whether the identification feature to be matched is a standard identification feature in the identification feature database pre-stored by the terminal;

若是,切换所述终端的操作系统。If so, switch the operating system of the terminal.

在一些实施方式中,所述切换方法还包括:In some embodiments, the handover method further includes:

获取用户的指纹持续按压所述终端的指纹感应元件的按压时长;Obtain the pressing duration of the user's fingerprint continuously pressing the fingerprint sensing element of the terminal;

判断所述按压时长是否超过预设阈值;judging whether the pressing duration exceeds a preset threshold;

若超过,则获取用户的指纹信息。If it exceeds, obtain the fingerprint information of the user.

在一些实施方式中,所述第一操作系统为常规模式系统;所述第二操作系统为安全模式系统,所述安全模式系统用于对重要数据进行加密。In some embodiments, the first operating system is a normal mode system; the second operating system is a security mode system, and the security mode system is used to encrypt important data.

在一些实施方式中,所述身份识别信息包括声纹信息、面部信息、虹膜信息以及人体阻抗信息中的一种或多种。In some embodiments, the identification information includes one or more of voiceprint information, facial information, iris information, and body impedance information.

在一些实施方式中,所述切换方法还包括:In some embodiments, the handover method further includes:

若所述待匹配指纹特征不是所述终端预存的指纹特征数据库中的标准指纹特征,则退出校验,所述终端维持原系统。If the fingerprint feature to be matched is not the standard fingerprint feature in the fingerprint feature database pre-stored by the terminal, the verification is exited, and the terminal maintains the original system.

在一些实施方式中,所述切换方法还包括:In some embodiments, the handover method further includes:

若所述待匹配身份识别特征不是所述终端预存的身份识别特征数据库中的标准身份识别特征,则退出校验,所述终端维持原系统。If the identification feature to be matched is not a standard identification feature in the identification feature database pre-stored by the terminal, the verification is exited, and the terminal maintains the original system.

第二方面,本申请实施例提供一种操作系统的切换装置,应用于终端,所述终端至少具有可来回切换的第一操作系统和第二操作系统,所述切换装置包括:In a second aspect, an embodiment of the present application provides an operating system switching device, which is applied to a terminal, where the terminal at least has a first operating system and a second operating system that can be switched back and forth, and the switching device includes:

第一获取单元,用于获取用户的指纹信息;a first acquiring unit, used for acquiring the fingerprint information of the user;

第一解析单元,用于根据所述指纹信息解析得到所述指纹信息的待匹配指纹特征;a first parsing unit, configured to parse and obtain the fingerprint features to be matched of the fingerprint information according to the fingerprint information;

第一判断单元,用于判断所述待匹配指纹特征是否为所述终端预存的指纹特征数据库中的标准指纹特征;a first judging unit, configured to judge whether the fingerprint feature to be matched is a standard fingerprint feature in a fingerprint feature database pre-stored by the terminal;

第二获取单元,用于在所述待匹配指纹特征为所述终端预存的指纹特征数据库中的标准指纹特征时获取用户的身份识别信息;a second obtaining unit, configured to obtain the user's identification information when the fingerprint feature to be matched is a standard fingerprint feature in the fingerprint feature database pre-stored by the terminal;

第二解析单元,用于根据所述身份识别信息解析得到所述身份识别信息的待匹配身份识别特征;a second parsing unit, configured to parse and obtain the to-be-matched identification feature of the identification information according to the identification information;

第二判断单元,用于判断所述待匹配身份识别特征是否为所述终端预存的身份识别特征数据库中的标准身份识别特征;a second judging unit, configured to judge whether the identity recognition feature to be matched is a standard identity recognition feature in the identity recognition feature database pre-stored by the terminal;

切换单元,用于当所述第二判断单元判断所述身份识别特征为终端预存的身份识别特征数据库中的标准身份识别特征时,切换所述终端的操作系统。A switching unit, configured to switch the operating system of the terminal when the second judging unit judges that the identification feature is a standard identification feature in the identification feature database pre-stored by the terminal.

在一些实施方式中,所述装置还包括:In some embodiments, the apparatus further comprises:

按压时长获取单元,用于获取用户的指纹持续按压所述终端的指纹感应元件的按压时长;a pressing duration acquisition unit, configured to acquire the pressing duration of the user's fingerprint continuously pressing the fingerprint sensing element of the terminal;

按压时长判断单元,用于判断所述按压时长是否超过预设阈值,其中,若所述按压时长判断单元判断所述按压时长超过预设阈值,所述第一获取单元将获取用户的指纹信息。A pressing duration judging unit, configured to determine whether the pressing duration exceeds a preset threshold, wherein, if the pressing duration judging unit determines that the pressing duration exceeds a preset threshold, the first acquiring unit will acquire the fingerprint information of the user.

第三方面,本申请实施例提供的一种终端,包括存储器和处理器;In a third aspect, a terminal provided by an embodiment of the present application includes a memory and a processor;

所述存储器存储有计算机程序;the memory stores a computer program;

所述处理器,用于执行所述计算机程序并在执行所述计算机程序时实现上面所述的一种操作系统的切换方法。The processor is configured to execute the computer program and implement the above-mentioned method for switching an operating system when the computer program is executed.

第四方面,本申请实施例提供的一种可读存储介质,所述可读存储介质存储有计算机程序,所述计算机程序被处理器执行时使所述处理器实现上面所述的一种操作系统的切换方法。In a fourth aspect, a readable storage medium provided by an embodiment of the present application stores a computer program, and when the computer program is executed by a processor, the processor implements one of the operations described above System switching method.

与现有技术相比,本发明主要有以下有益效果:Compared with the prior art, the present invention mainly has the following beneficial effects:

上述提供的一种操作系统的切换方法,获取用户的指纹信息;根据指纹信息解析得到指纹信息的待匹配指纹特征;判断待匹配指纹特征是否为终端预存的指纹特征数据库中的标准指纹特征;若是,获取用户的身份识别信息;根据身份识别信息解析得到身份识别信息的待匹配身份识别特征;判断待匹配身份识别特征是否为终端预存的身份识别特征数据库中的标准身份识别特征;若是,切换终端的操作系统。通过在终端预设指纹特征数据库以及身份识别特征数据库,当获取到的指纹信息解析为指纹特征且可以匹配指纹特征数据库中的标准指纹特征时,获取身份识别信息,当获取到的身份识别信息解析为身份识别特征且可以匹配身份识别特征数据库中的标准身份识别特征时,满足系统切换的条件,系统由第一系统切换至第二系统;这种切换系统的方式保密性强,不会暴露终端具有双系统,满足了用户的使用要求。The method for switching an operating system provided above is to obtain the fingerprint information of the user; to analyze and obtain the fingerprint feature to be matched of the fingerprint information according to the fingerprint information; to determine whether the fingerprint feature to be matched is the standard fingerprint feature in the fingerprint feature database pre-stored by the terminal; , obtain the user's identification information; parse the identification information to obtain the identification features to be matched according to the identification information; determine whether the identification features to be matched are the standard identification features in the identification feature database pre-stored by the terminal; if so, switch the terminal operating system. By presetting the fingerprint feature database and the identification feature database on the terminal, when the acquired fingerprint information is parsed into fingerprint features and can match the standard fingerprint features in the fingerprint feature database, the identification information is obtained, and when the acquired identification information is analyzed When it is an identification feature and can match the standard identification feature in the identification feature database, the conditions for system switching are met, and the system is switched from the first system to the second system; this method of switching systems is highly confidential and will not expose the terminal. With dual systems, it meets the requirements of users.

附图说明Description of drawings

图1是本发明实施例提供的一种操作系统的切换方法的流程示意图;1 is a schematic flowchart of a method for switching an operating system according to an embodiment of the present invention;

图2是本发明实施例提供的一种操作系统的切换方法中具有S10以及S20步骤的流程示意图;2 is a schematic flowchart of steps S10 and S20 in an operating system switching method provided by an embodiment of the present invention;

图3是本发明实施例提供的一种操作系统的切换装置的结构示意性框图;3 is a schematic block diagram of the structure of an operating system switching device provided by an embodiment of the present invention;

图4是本发明实施例提供的一种操作系统的切换装置具有按压时长获取单元以及按压时长判断单元的结构示意性框图。FIG. 4 is a schematic block diagram of the structure of an operating system switching device provided by an embodiment of the present invention having a pressing duration acquiring unit and a pressing duration determining unit.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

以下结合具体实施例对本发明的实现进行详细的描述。The implementation of the present invention will be described in detail below with reference to specific embodiments.

图1示出了本发明提供的一种操作系统的切换方法的流程示意图,参考图1,该方法包括:步骤S30、步骤S40、步骤S50、步骤S60、步骤S70、步骤S80以及步骤S90。FIG. 1 shows a schematic flowchart of an operating system switching method provided by the present invention. Referring to FIG. 1 , the method includes steps S30 , S40 , S50 , S60 , S70 , S80 and S90 .

步骤S30、获取用户的指纹信息。Step S30: Obtain the fingerprint information of the user.

需要说明的是,指纹识别即指通过比较不同指纹的细节特征点来进行鉴别。指纹识别技术涉及图像处理、模式识别、计算机视觉、数学形态学、小波分析等众多学科。由于每个人的指纹不同,就是同一人的十指之间,指纹也有明显区别,因此指纹可用于身份鉴定。It should be noted that fingerprint identification refers to identification by comparing the minutiae feature points of different fingerprints. Fingerprint recognition technology involves image processing, pattern recognition, computer vision, mathematical morphology, wavelet analysis and many other disciplines. Since each person's fingerprints are different, that is, between the ten fingers of the same person, the fingerprints are also significantly different, so the fingerprints can be used for identification.

具体地,在指纹采集方式上,目前主要分两种:滑动式和按压式。滑动式采集是将手指在传感器上滑过,从而使手机获得手指指纹图像。滑动式采集具有成本相对偏低,而且可以采集大面积图像的优势。但这种采集方式存在体验较差的问题,使用者需要一个连续规范的滑动动作才能实现采集成功,采集失败的概率大大增加。某品牌手机曾经使用过这种采集方式,因滑动式采集存在的短板而受到诟病。按压式采集顾名思义就是在传感器上按压实现指纹数据采集,这种采集方式当然用户体验好一些,不过成本比滑动采集高,技术难度也相对高一些。此外,由于一次采集的指纹面积相对滑动式采集来说要小一些,就得多次采集,通过“拼凑”,拼出较大面积的指纹图像。这就必须仰仗先进的算法,用软件算法来弥补滑按压式采集获得的指纹面积相对偏小的问题,以保障识别的精确度。Specifically, there are currently two main types of fingerprint collection methods: sliding and pressing. Swipe capture is to slide a finger on the sensor, so that the mobile phone obtains the fingerprint image of the finger. Sliding acquisition has the advantages of relatively low cost and the ability to acquire large-area images. However, this collection method has the problem of poor experience. The user needs a continuous and standardized sliding action to achieve successful collection, and the probability of collection failure is greatly increased. A certain brand of mobile phone has used this collection method, and it has been criticized for the shortcomings of sliding collection. As the name implies, press-type acquisition is to press on the sensor to realize fingerprint data acquisition. Of course, this acquisition method has a better user experience, but the cost is higher than that of sliding acquisition, and the technical difficulty is relatively higher. In addition, since the area of the fingerprint collected at one time is smaller than that of the sliding collection, it has to be collected multiple times, and a larger area of the fingerprint image is spelled out through "patchwork". This must rely on advanced algorithms and use software algorithms to make up for the relatively small area of fingerprints obtained by sliding and pressing collection to ensure the accuracy of identification.

采集装置主要有以下几种原理:The collection device mainly has the following principles:

第一,光学式,利用光线反射成像识别用户指纹,该类型指纹模块对使用环境的温度湿度都有一定的要求,并且在识别准确度上并不理想,再加上这种模块一般会占用更大的空间,使其难以在手机端有所作为。First, optical type, which uses light reflection imaging to identify user fingerprints. This type of fingerprint module has certain requirements on the temperature and humidity of the operating environment, and the recognition accuracy is not ideal. In addition, this type of module generally occupies more space. The large space makes it difficult to make a difference on the mobile phone.

第二,电容式,电容式指纹模块是利用硅晶元与导电的皮下电解液形成电场,指纹的高低起伏会导致二者之间的压差出现不同的变化,借此可实现准确的指纹测定。该方式适应能力强,对使用环境无特殊要求,同时,硅晶元以及相关的传感原件对空间的占用在手机设计的可接受范围内,因而使得该技术在手机端得到了比较好的推广。目前的电容式指纹模块也分为划擦式与按压式两种,前者虽然占用体积较小,但在识别率以及便捷性方面有很大的劣势,这也直接导致厂商全都将目光锁定在了操作更加随意、识别率更高的按压式电容指纹模块。电容纹识别模组主要由芯片、“蓝宝石”、金属环、软板、载板等组成,其中芯片也就是传感器部分,而“蓝宝石”负责作为保护层(有厂商选择其他材料做为保护层,成本相应会降低),金属环作为指纹识别的触发装置。Second, capacitive, capacitive fingerprint modules use silicon crystals and conductive subcutaneous electrolyte to form an electric field. The fluctuation of the fingerprint will cause different changes in the pressure difference between the two, thereby realizing accurate fingerprint determination. . This method has strong adaptability and no special requirements for the use environment. At the same time, the space occupation of silicon wafers and related sensing components is within the acceptable range of mobile phone design, so this technology has been well promoted in mobile phones. . The current capacitive fingerprint module is also divided into two types: wipe type and push type. Although the former occupies a small volume, it has great disadvantages in terms of recognition rate and convenience. Press-type capacitive fingerprint module with more casual operation and higher recognition rate. Capacitance pattern recognition module is mainly composed of chip, "sapphire", metal ring, flexible board, carrier board, etc. The chip is also the sensor part, and "sapphire" is responsible for the protective layer (some manufacturers choose other materials as the protective layer, The cost will be reduced accordingly), and the metal ring is used as a trigger for fingerprint recognition.

第三,射频式,包含无线电波探测与超声波探测两种,原理与探测海底物质的的声纳类似,是靠特定频率的信号反射来探知指纹的具体形态的。射频指纹模块技术是通过传感器本身发射出微量射频信号,穿透手指的表皮层去控测里层的纹路,来获得最佳的指纹图像。这一类指纹模块最大的优点便是手指无需与指纹模块相接触,因而不会对手机的外观造成太大影响。基于这一点,射频指纹模块也成为了未来指纹识别的主要发展方向之一。The third is the radio frequency type, which includes radio wave detection and ultrasonic detection. The principle is similar to that of sonar for detecting seabed materials. The RF fingerprint module technology is to obtain the best fingerprint image by emitting a small amount of RF signal from the sensor itself, penetrating the epidermis layer of the finger to control and measure the texture of the inner layer. The biggest advantage of this type of fingerprint module is that the finger does not need to be in contact with the fingerprint module, so it will not cause much impact on the appearance of the mobile phone. Based on this, the RF fingerprint module has also become one of the main development directions of fingerprint identification in the future.

步骤S40、根据所述指纹信息解析得到所述指纹信息的待匹配指纹特征。Step S40 , analysing the fingerprint information according to the fingerprint information to obtain the fingerprint features to be matched of the fingerprint information.

具体地,指纹图像的特征分为全局特征与局部特征,全局特征是指直接可以观察到的宏观特征,一般用于快速分类以及粗匹配阶段。局部特征是指指纹拓扑图中几种有效的特征,比如指纹纹路是不是连续的,方向是不是一致,具体到细节特征就表现为断点、分叉点、交叉点、桥、环等等,这些通常称之为特征点。这些特征点之间,特征点与周围脊线之间等等都包含了丰富的信息,比如特征点的类型、方向、位置等等。特征匹配就是利用这些信息进行的。Specifically, the features of fingerprint images are divided into global features and local features. Global features refer to macroscopic features that can be directly observed, and are generally used for fast classification and rough matching stages. Local features refer to several effective features in the fingerprint topology map, such as whether the fingerprint lines are continuous, whether the direction is consistent, and specific details are expressed as breakpoints, bifurcation points, intersections, bridges, rings, etc., These are usually called feature points. These feature points, between the feature points and the surrounding ridges, etc., contain rich information, such as the type, direction, location, and so on of the feature points. Feature matching is performed using this information.

最常用的特征点提取算法有两类:一是从灰度图像直接提取特征点;二是对预处理细化后的图像进行提取特征点。There are two most commonly used feature point extraction algorithms: one is to directly extract feature points from grayscale images; the other is to extract feature points from pre-processed and refined images.

直接灰度图像指纹特征提取的原理是使用模式识别的方法跟踪灰度图上的纹线走向。正常区域指纹的纹线应该是连续的,当出现断裂终止分开时,则停下来根据规则进行特征点判定。该算法主要由几个紧密联系的模块组成:(1)跟踪步进模块,主要负责预测下一步跟踪方向和步长,用来沿纹线前进一步。(2)中心点确定模块,负责确定纹线的脊部中心点,使跟踪方向不断调整,始终沿纹线的中心前进。(3)标记模块,用来给跟踪过的纹线作记号,以免重复跟踪,陷入死循环。(4)特征判定模块,负责当跟踪到达纹线流向异常区域时,判定是否为特征点及特征点类型。具体算法如下:(1)计算指纹图像的方向图,一般以块方向作为指纹的方向。(2)从初始点出发,根据指纹图像的方向信息,在该处的法线方向上,半个指纹周期内,求取灰度分布的最大值和最小值,并以该最大值处的像素点作为新的出发点。(3)从新的出发点出发,沿指纹图像的方向图的方向前进一定步长(算法最开始是按固定步长进行跟踪的,后来发展到自适应步长跟踪),继续在发现方向求取灰度分布的最大值和最小值,仍然以最大值处的像素点作为新的出发点。(4)不断重复步骤3,实现脊线跟踪,直到求取的灰度分布的最大值出现明显的变小,与最小值差不多,甚至相等时,停止跟踪,说明己经到脊线的末端,此处即为特征点端点处。若跟踪到的脊线与先前己经跟踪过的脊线相交,停止跟踪,求取两条脊线交点位置,此处即特征点分叉点。直接从灰度图像中提取特征的算法一般是对灰度指纹纹线进行跟踪,根据跟踪结果寻找特征的位置和判断特征的类型。这种方法省去了复杂的指纹图像预处理过程,但是特征提取的算法却十分复杂,而且由于噪声等因素影响,提取的特征信息(位置、方向等)也不够准确。The principle of direct grayscale image fingerprint feature extraction is to use pattern recognition to track the direction of the ridges on the grayscale image. The ridges of the fingerprint in the normal area should be continuous. When there is a break and the separation is terminated, it will stop and judge the feature points according to the rules. The algorithm is mainly composed of several closely related modules: (1) Tracking step module, which is mainly responsible for predicting the next tracking direction and step size, and is used to advance one step along the ridge. (2) The center point determination module is responsible for determining the center point of the ridge of the ridge, so that the tracking direction is continuously adjusted and always advances along the center of the ridge. (3) The marking module is used to mark the tracked lines, so as to avoid repeated tracking and falling into an infinite loop. (4) The feature determination module is responsible for determining whether it is a feature point and the type of the feature point when the tracking reaches the abnormal area of the ridge flow direction. The specific algorithm is as follows: (1) Calculate the direction map of the fingerprint image, and generally take the block direction as the direction of the fingerprint. (2) Starting from the initial point, according to the direction information of the fingerprint image, in the normal direction of the place, within half the fingerprint cycle, obtain the maximum and minimum values of the grayscale distribution, and use the pixel at the maximum value. point as a new starting point. (3) Starting from a new starting point, advance a certain step in the direction of the direction map of the fingerprint image (the algorithm was initially tracked with a fixed step, and later developed to adaptive step tracking), and continue to find gray in the direction of discovery. The maximum and minimum values of the degree distribution still take the pixel at the maximum value as the new starting point. (4) Repeat step 3 continuously to realize ridge line tracking, until the maximum value of the obtained gray distribution becomes significantly smaller, which is similar to the minimum value, or even equal, stop tracking, indicating that it has reached the end of the ridge line, This is the end point of the feature point. If the tracked ridge line intersects with the previously tracked ridge line, stop tracking, and find the position of the intersection of the two ridge lines, which is the bifurcation point of the feature point. The algorithm for extracting features directly from a grayscale image is generally to track the grayscale fingerprint ridges, and find the location of the feature and determine the type of the feature according to the tracking result. This method saves the complex fingerprint image preprocessing process, but the feature extraction algorithm is very complicated, and due to the influence of noise and other factors, the extracted feature information (position, direction, etc.) is not accurate enough.

基于细化图像的模板匹配法,是先将指纹图像经过图像归一化、增强、二值化和细化等一系列的预处理得到细化的指纹图像,再通过构建像素的3×3邻域提取指纹图像的特征点。The template matching method based on the thinned image firstly obtains the thinned fingerprint image by a series of preprocessing such as image normalization, enhancement, binarization and thinning, and then constructs the 3×3 adjacent pixels of the fingerprint image. domain to extract feature points from fingerprint images.

步骤S50、判断所述待匹配指纹特征是否为所述终端预存的指纹特征数据库中的标准指纹特征。Step S50, judging whether the fingerprint feature to be matched is a standard fingerprint feature in the fingerprint feature database pre-stored by the terminal.

具体地,在验证模式下,指纹匹配主要是比较两组特征点是否符合同一结构模式;在识别模式下,首先要对指纹进行分类,然后根据不同的类别在指纹数据库中搜索与其类别相一致的指纹进行最终的精确比对。其中,细节点的匹配一般都是比较两幅图像的特征点组成的模式。两个特征点模式的相似程度用匹配的特征点的个数来比较,匹配结果是通过与预先设定的问值相比较而得出的。Specifically, in the verification mode, the fingerprint matching mainly compares whether the two sets of feature points conform to the same structural pattern; in the identification mode, the fingerprints are first classified, and then the fingerprint database is searched for the same category according to different categories. Fingerprints for final accurate comparison. Among them, the matching of minutiae points is generally a pattern formed by comparing the feature points of two images. The similarity of the two feature point patterns is compared by the number of matched feature points, and the matching result is obtained by comparing with the preset interrogation value.

因此,匹配算法的核心思想是:通过某些坐标变换(如平移、旋转、伸缩变换),消除指纹位移、旋转和崎变对特征点位造成的影响;然后对比坐标变换后指纹特征点的相关信息(位置、类型、角度等)。由于各种因素的影响,同一指纹两次输入所得的特征模板难以完全相同,因此,当比对输入指纹的特征与指纹库中的模板特征达到一定的相似程度时,就认为这两个指纹匹配成功。一般认为,如果两枚指纹能有13对特征点相匹配,即可做出匹配成功的结论,即可以断定两枚指纹来自同一个人的同一个手指。Therefore, the core idea of the matching algorithm is: through some coordinate transformations (such as translation, rotation, and scaling transformation), to eliminate the influence of fingerprint displacement, rotation and roughness on the feature points; then compare the relevant information of the fingerprint feature points after the coordinate transformation. (position, type, angle, etc.). Due to the influence of various factors, it is difficult for the feature templates obtained by two inputs of the same fingerprint to be exactly the same. Therefore, when the features of the input fingerprint are compared to the template features in the fingerprint database to a certain degree of similarity, the two fingerprints are considered to match. success. It is generally believed that if two fingerprints can match 13 pairs of feature points, the conclusion of successful matching can be made, that is, it can be concluded that the two fingerprints are from the same finger of the same person.

另外,在实际的比对过程中,两枚指纹之间的比较不是一种刚性的、无偏差的比较,相反应该是一种弹性的、允许存在一定的位置偏差和方向偏差的比较。因此,匹配结果用“匹配度”来表示。当匹配度大于某一阈值时,认为两指纹匹配:当小于该阈值时,认为不匹配。匹配算法不同,匹配度的计算方法也各不相同,而阈值的大小通常根据经验、系统安全等级等因素人为设定。当阈值较大时,系统安全性增加,但错误拒绝率将升高。当阈值较小时,系统易用性增加,但错误接受率将升高。In addition, in the actual comparison process, the comparison between the two fingerprints is not a rigid, unbiased comparison, but an elastic comparison that allows certain positional and directional deviations. Therefore, the matching result is represented by "matching degree". When the matching degree is greater than a certain threshold, it is considered that the two fingerprints match; when it is less than the threshold, it is considered that they do not match. The matching algorithm is different, and the calculation method of the matching degree is also different, and the size of the threshold is usually set artificially according to factors such as experience and system security level. When the threshold is larger, the system security increases, but the false rejection rate will increase. When the threshold is small, the ease of use of the system increases, but the false acceptance rate will increase.

步骤S60、若所述待匹配指纹特征是所述终端预存的指纹特征数据库中的标准指纹特征,则获取用户的身份识别信息。Step S60: If the fingerprint feature to be matched is a standard fingerprint feature in the fingerprint feature database pre-stored by the terminal, obtain the user's identity identification information.

具体地,身份识别信息包括声纹信息、面部信息、虹膜信息以及人体阻抗信息中的一种或多种。Specifically, the identification information includes one or more of voiceprint information, face information, iris information, and human body impedance information.

所谓声纹,是用电声学仪器显示的携带言语信息的声波频谱。现代科学研究表明,声纹不仅具有特定性,而且有相对稳定性的特点。成年以后,人的声音可保持长期相对稳定不变。实验证明,无论讲话者是故意模仿他人声音和语气,还是耳语轻声讲话,即使模仿得惟妙惟肖,其声纹却始终不同。The so-called voiceprint is the sound wave spectrum that carries speech information displayed by electroacoustic instruments. Modern scientific research shows that voiceprints are not only specific, but also relatively stable. After adulthood, the human voice can remain relatively stable for a long time. Experiments have shown that whether the speaker deliberately imitates the voice and tone of others, or whispers softly, even if the imitation is vivid, the voiceprint is always different.

标准声纹采集设备,可以参考市场上推出标准声纹采集设备,它是专门为标准声纹采集场景研发的声纹采集设备,采用智能化麦克风集群,支持单向/全向拾音、多种文本采集方式,保证声纹信息采集内容的完整性和真实性,提高声纹采集的质量和效率。Standard voiceprint collection equipment, you can refer to the standard voiceprint collection equipment launched on the market. It is a voiceprint collection equipment specially developed for standard voiceprint collection scenarios. It adopts intelligent microphone cluster and supports unidirectional/omnidirectional pickup, various The text collection method ensures the integrity and authenticity of the voiceprint information collection content, and improves the quality and efficiency of the voiceprint collection.

人脸识别,是基于人的脸部特征信息进行身份识别的一种生物识别技术。用摄像机或摄像头采集含有人脸的图像或视频流,并自动在图像中检测和跟踪人脸,进而对检测到的人脸进行识别的一系列相关技术,通常也叫做人像识别、面部识别。Face recognition is a kind of biometric identification technology based on human facial feature information. A series of related technologies that use cameras or cameras to capture images or video streams containing human faces, and automatically detect and track human faces in the images, and then recognize the detected faces, also known as portrait recognition and facial recognition.

不同的人脸图像都能通过摄像镜头采集下来,比如静态图像、动态图像、不同的位置、不同表情等方面都可以得到很好的采集。当用户在采集设备的拍摄范围内时,采集设备会自动搜索并拍摄用户的人脸图像。人脸检测在实际中主要用于人脸识别的预处理,即在图像中准确标定出人脸的位置和大小。人脸图像中包含的模式特征十分丰富,如直方图特征、颜色特征、模板特征、结构特征等。人脸检测就是把这其中有用的信息挑出来,并利用这些特征实现人脸检测。对于人脸的图像预处理是基于人脸检测结果,对图像进行处理并最终服务于特征提取的过程。系统获取的原始图像由于受到各种条件的限制和随机干扰,往往不能直接使用,必须在图像处理的早期阶段对它进行灰度校正、噪声过滤等图像预处理。对于人脸图像而言,其预处理过程主要包括人脸图像的光线补偿、灰度变换、直方图均衡化、归一化、几何校正、滤波以及锐化等。Different face images can be collected through the camera lens, such as static images, dynamic images, different positions, different expressions, etc., can be well collected. When the user is within the shooting range of the collecting device, the collecting device will automatically search for and shoot the user's face image. In practice, face detection is mainly used for the preprocessing of face recognition, that is, to accurately calibrate the position and size of the face in the image. The pattern features contained in face images are very rich, such as histogram features, color features, template features, structural features, etc. Face detection is to pick out the useful information and use these features to achieve face detection. The image preprocessing of the face is the process of processing the image and finally serving the feature extraction based on the face detection result. The original image obtained by the system cannot be used directly due to various limitations and random interference, and it must be pre-processed such as grayscale correction and noise filtering in the early stage of image processing. For face images, the preprocessing process mainly includes light compensation, grayscale transformation, histogram equalization, normalization, geometric correction, filtering and sharpening of face images.

虹膜识别技术是基于眼睛中的虹膜进行身份识别。人的眼睛结构由巩膜、虹膜、瞳孔晶状体、视网膜等部分组成。虹膜是位于黑色瞳孔和白色巩膜之间的圆环状部分,其包含有很多相互交错的斑点、细丝、冠状、条纹、隐窝等的细节特征。而且虹膜在胎儿发育阶段形成后,在整个生命历程中将是保持不变的。这些特征决定了虹膜特征的唯一性,同时也决定了身份识别的唯一性。因此,可以将眼睛的虹膜特征作为每个人的身份识别对象。Iris recognition technology is based on the iris in the eye for identification. The structure of the human eye consists of the sclera, iris, pupil lens, retina and other parts. The iris is the annular portion located between the black pupil and the white sclera, which contains many detailed features of interlaced spots, filaments, crowns, striations, crypts, etc. And after the iris is formed during fetal development, it will remain the same throughout life. These features determine the uniqueness of iris features, and also determine the uniqueness of identification. Therefore, the iris feature of the eye can be used as the identification object of each person.

虹膜图像的获取是通过特定的摄像器材对人的整个眼部进行拍摄,并将拍摄到的图像传输给虹膜识别系统的图像预处理软件,对获取到的虹膜图像进行如下处理,使其满足提取虹膜特征的需求:(1)虹膜定位:确定内圆、外圆和二次曲线在图像中的位置。其中,内圆为虹膜与瞳孔的边界,外圆为虹膜与巩膜的边界,二次曲线为虹膜与上下眼皮的边界。(2)虹膜图像归一化:将图像中的虹膜大小,调整到识别系统设置的固定尺寸。(3)图像增强:针对归一化后的图像,进行亮度、对比度和平滑度等处理,提高图像中虹膜信息的识别率。The acquisition of the iris image is to shoot the entire human eye through a specific camera, and transmit the captured image to the image preprocessing software of the iris recognition system. The acquired iris image is processed as follows to meet the extraction requirements. Requirements for iris features: (1) Iris localization: determine the positions of the inner circle, outer circle and quadratic curve in the image. The inner circle is the boundary between the iris and the pupil, the outer circle is the boundary between the iris and the sclera, and the quadratic curve is the boundary between the iris and the upper and lower eyelids. (2) Normalization of iris image: Adjust the size of the iris in the image to the fixed size set by the recognition system. (3) Image enhancement: For the normalized image, the brightness, contrast and smoothness are processed to improve the recognition rate of iris information in the image.

步骤S70、根据所述身份识别信息解析得到所述身份识别信息的待匹配身份识别特征。Step S70, analysing the identification information according to the identification information to obtain the identification features to be matched of the identification information.

需要说明的是,对于声纹识别来说,音色是最能反映一个人身份信息的属性,而音色上的差异在信号处理的层面可以表示为在频域不同频段能量的差异,因此通过抽取不同频段上的能量值,即可以表示在这个短时语音范围内频谱的性质。通常我们会综合考虑人耳的听觉属性、均衡不同频段的能量差异、噪声鲁棒性以及后续的计算便利设计合适的短时声学特征,通过一系列复杂的信号处理层面的变换,一段20-50毫秒长度的语音可以映射为一段39-60维的向量。为了充分保留语音中的原始信息,同时不增加计算的负担,通常会以15-20毫秒为间隔依次取短时段语音,然后提取特征。在声纹识别,包括语音识别领域,传统的声学特征包括梅尔倒谱系数MFCC、感知线性预测系数PLP、近几年的逐渐受到关注的深度特征DeepFeature、以及能量规整谱系数等,都能作为声纹识别在特征提取层面可选且表现良好的声学特征。综上,一段语音就被映射为时间轴上一系列的向量集合,这些集合再通过一些规整的操作后,即可成为反映语音特性的特征集合。接下来就是为让声纹形成特征而进行的建模,声纹识别系统是一个典型的模式识别的框架,为了让计算机认识一个用户的身份,需要目标用户首先提供一段训练语音,这段语音经过特征提取和模型训练等一系列操作,会被映射为用户的声纹模型。It should be noted that, for voiceprint recognition, timbre is the attribute that can best reflect a person's identity information, and the difference in timbre can be expressed as the difference in energy in different frequency bands in the frequency domain at the level of signal processing. The energy value on the frequency band can represent the nature of the spectrum in this short-term speech range. Usually, we will design appropriate short-term acoustic features by comprehensively considering the auditory properties of the human ear, equalizing the energy differences in different frequency bands, noise robustness, and subsequent calculation convenience. Through a series of complex signal processing level transformations, a period of 20-50 A millisecond-long speech can be mapped to a 39-60-dimensional vector. In order to fully retain the original information in the speech without increasing the computational burden, usually a short period of speech is taken in sequence at intervals of 15-20 milliseconds, and then features are extracted. In the field of voiceprint recognition, including speech recognition, traditional acoustic features including Mel cepstral coefficient MFCC, perceptual linear prediction coefficient PLP, deep feature DeepFeature, which has gradually attracted attention in recent years, and energy normalized spectral coefficient, etc., can be used as Voiceprint recognition is an optional and well-performing acoustic feature at the feature extraction level. To sum up, a piece of speech is mapped to a series of vector sets on the time axis, and these sets can become feature sets reflecting the characteristics of speech after some regular operations. The next step is to model the voiceprint to form features. The voiceprint recognition system is a typical pattern recognition framework. In order for the computer to recognize the identity of a user, the target user needs to provide a training voice first. A series of operations such as feature extraction and model training will be mapped to the user's voiceprint model.

关于人脸特征提取的方法,概述如下:(1)基于子空间(代数特征)的方法:将一幅图像看成一个矩阵,通过做矩阵变换或线性投影,可以抽取人脸的代数特征;(2)基于几何特征的方法:人脸由眼睛、鼻子、嘴、下巴等部件构成,对这些部件和结构关系的几何描述,可作为识别人脸的重要特征。(3)神经网络方法:人工神经网络由于其固有的并行运算机制以及对模式的分布式全局存储,故可用于模式识别,而且不受模式形变影响。(4)形变模型方法:通过在人脸特征边沿,选择一些稀疏的基准点描述人脸的形状特征,然后将形状变到所有人脸图像的平均形状,再根据变形后的形状进行纹理灰度变形,形成形状无关的人脸图像。(5)基于弹性模型匹配方法:弹性模型匹配方法的思想是将人脸上的一些特征点作为基准点构成弹性图,每个基准点存储一串具有代表性的特征矢量,采用分级结构的弹性图,去除一些冗余节点,形成稀疏的人脸描述结构。通过测试样本和特征样本的弹性匹配来完成识别。The methods of face feature extraction are summarized as follows: (1) Method based on subspace (algebraic features): an image is regarded as a matrix, and the algebraic features of the face can be extracted by doing matrix transformation or linear projection; ( 2) Methods based on geometric features: The human face is composed of parts such as eyes, nose, mouth, and chin. The geometric description of these parts and their structural relationships can be used as an important feature for face recognition. (3) Neural network method: artificial neural network can be used for pattern recognition due to its inherent parallel operation mechanism and distributed global storage of patterns, and is not affected by pattern deformation. (4) Deformation model method: select some sparse reference points on the edge of the face feature to describe the shape features of the face, and then change the shape to the average shape of all face images, and then perform texture grayscale according to the deformed shape. Deformation to form a shape-independent face image. (5) Based on elastic model matching method: The idea of elastic model matching method is to use some feature points on the face as reference points to form an elastic map, each reference point stores a series of representative feature vectors, and adopts the elasticity of the hierarchical structure. In the graph, some redundant nodes are removed to form a sparse face description structure. Recognition is done by elastic matching of test samples and feature samples.

对于虹膜识别来说,虹膜图像包含有丰富的细节特征。如果将预处理后的虹膜图像作为一幅纹理图像,那么许多纹理分析的方法都可用来抽取虹膜征。比较典型的方法有三种:(1)Gabor滤波:从图像中提取纹理信息的有效策略之一是将图像与带通滤波器卷积,其中带通滤波器可以选择2DGabor滤波器。2DGabor滤波器提供空间频率、方向、空间位置的最大分辨率,因此在空间和频域中具有良好的联合定位能力。(2)二维小波变换:小波变换是一个常用的图像分析手段,并且在纹理识别中有较多的应用。一个二维小波变换可以看作两个连续一维小波变换。二维小波变换将一幅图像分解成一系列的低频子图像。(3)小波变换过零检测算法:以虹膜中心为圆心的同心圆对虹膜图像进行间隔采样。把二维的虹膜图像变成一维信号。For iris recognition, iris images contain rich detailed features. If the preprocessed iris image is used as a texture image, many texture analysis methods can be used to extract iris features. There are three typical methods: (1) Gabor filtering: One of the effective strategies for extracting texture information from an image is to convolve the image with a band-pass filter, where the band-pass filter can choose a 2DGabor filter. The 2DGabor filter provides the maximum resolution of spatial frequency, direction, and spatial position, so it has good co-localization capability in both spatial and frequency domains. (2) Two-dimensional wavelet transform: Wavelet transform is a common image analysis method, and has many applications in texture recognition. A two-dimensional wavelet transform can be regarded as two consecutive one-dimensional wavelet transforms. The two-dimensional wavelet transform decomposes an image into a series of low-frequency sub-images. (3) Wavelet transform zero-crossing detection algorithm: The iris image is sampled at intervals with concentric circles with the center of the iris as the center. Convert a two-dimensional iris image into a one-dimensional signal.

步骤S80、判断所述待匹配身份识别特征是否为所述终端预存的身份识别特征数据库中的标准身份识别特征。Step S80, judging whether the to-be-matched identification feature is a standard identification feature in an identification feature database pre-stored by the terminal.

具体地,对于声纹特征识别来说,在验证阶段,一个身份未知的语音也会经过一系列的操作被映射为测试特征,测试特征会与目标模型进行某种相似度的计算后得到一个置信度的得分,这个得分通常会与我们人工设定的期望值进行比较,高于这个期望值,我们认为测试语音对应的身份与目标用户身份匹配,通过验证;反之,则拒绝掉测试身份。Specifically, for voiceprint feature recognition, in the verification stage, an unknown voice will also be mapped to a test feature through a series of operations, and the test feature will be calculated with a certain similarity with the target model to obtain a confidence The score is usually compared with our artificially set expectation value. If it is higher than this expectation value, we consider that the identity corresponding to the test voice matches the target user identity and passes the verification; otherwise, the test identity is rejected.

对于人脸识别来说,人脸识别的方法都有类似的过程,即都使用了分好类的训练数据集(人脸数据库,每个人都有很多样本)来进行训练,对图像或视频中检测到的人脸进行分析,并从两方面来确定:是否识别到目标以及目标真正被识别到的置信度的度量,这也称为置信度评分。方法如下:(1)Eigenfaces算法实现人脸识别,Eigenfaces是通过PCA来处理的。PCA是计算机视觉中提到最多的数学概念。PCA的本质是识别某个训练集上(比如人脸数据库)的主成分,并计算出训练集(图像或帧中检测到的人脸)相对于数据库的发散程度,并输出一个值。该值越小,表明人脸数据库和检测到的人脸之间的差别就越小;0值表示完全匹配。(2)Fisherfaces算法实现人脸识别,Fisherfaces是从PCA衍生并发展起来的概念,它采用更复杂的逻辑。尽管计算更加密集,但比Eigenfaces更容易得到准确的效果。(3)LocalBinaryPatternHistogram(LBPH)算法实现人脸识别,LBPH粗略地(在非常高的层次上)将检测到的人脸分成小单元,并将其与模型中的对应单元进行比较,对每个区域的匹配值产生一个直方图。由于这种方法的灵活性,LBPH是唯一允许模型样本人脸和检测到的人脸在形状、大小上可以不同的人脸识别算法。For face recognition, the methods of face recognition have a similar process, that is, they all use a well-classified training data set (face database, each person has many samples) for training. The detected faces are analyzed and determined from two aspects: whether the target is recognized and a measure of the confidence that the target is actually recognized, which is also known as the confidence score. The methods are as follows: (1) Eigenfaces algorithm realizes face recognition, and Eigenfaces are processed by PCA. PCA is the most mentioned mathematical concept in computer vision. The essence of PCA is to identify the principal components on a training set (such as a face database), and calculate the divergence of the training set (faces detected in images or frames) relative to the database, and output a value. The smaller the value, the smaller the difference between the face database and the detected faces; a value of 0 indicates an exact match. (2) The Fisherfaces algorithm realizes face recognition. Fisherfaces is a concept derived and developed from PCA, which adopts more complex logic. Although more computationally intensive, it is easier to get accurate results than Eigenfaces. (3) The LocalBinaryPatternHistogram (LBPH) algorithm implements face recognition. LBPH roughly (at a very high level) divides the detected face into small units and compares them with the corresponding units in the model. produces a histogram of matching values. Due to the flexibility of this approach, LBPH is the only face recognition algorithm that allows model sample faces and detected faces to be different in shape and size.

对于虹膜识别来说,基于已提取的虹膜特征进行虹膜识别,是一个典型的模式匹配问题。比较常用的两种算法是:(1)海明距:把虹膜纹理转化成有效的虹膜代码后,以虹膜代码的海明距大小来判别,即将不同的虹膜码进行按位异或比较。(2)方差倒数加权欧氏距离分类法:将未知虹膜的特征向量同已经训练好的已知类别的虹膜特征向量相比较,当且仅当它的特征向量与第K类特征向景的方差倒数加权欧氏距离最小时,输入虹膜就被分类为第K类虹膜。For iris recognition, iris recognition based on extracted iris features is a typical pattern matching problem. Two commonly used algorithms are: (1) Hamming distance: After converting the iris texture into an effective iris code, it is judged by the Hamming distance of the iris code, that is, different iris codes are compared by bitwise XOR. (2) Variance reciprocal weighted Euclidean distance classification method: compare the feature vector of the unknown iris with the iris feature vector of the known class that has been trained, if and only if its feature vector is the variance of the K-th feature vector When the reciprocal weighted Euclidean distance is the smallest, the input iris is classified as the K-th iris.

虹膜特征数据库中存放的是已知虹膜纹理的特征向量。在虹膜识别过程中,首先要对待识别的虹膜图像进行处理分析得到虹膜特征码,然后将所提取的特征码与数据库中的特征码模板进行比对,最后得出分类结果。为了将虹膜用于身份识别,在虹膜识别系统的后台需要一个大型的虹膜特征数据库,以便于对虹膜特征码进行存储和查询。The iris feature database stores feature vectors of known iris textures. In the process of iris recognition, the iris image to be recognized is first processed and analyzed to obtain the iris signature, and then the extracted signature is compared with the signature template in the database, and finally the classification result is obtained. In order to use the iris for identity recognition, a large iris feature database is required in the background of the iris recognition system, so as to store and query the iris feature code.

步骤S90、若所述待匹配身份识别特征是所述终端预存的身份识别特征数据库中的标准身份识别特征,则切换所述终端的操作系统。Step S90 , if the identification feature to be matched is a standard identification feature in the identification feature database pre-stored by the terminal, switch the operating system of the terminal.

具体地,第一操作系统为常规模式系统;第二操作系统为安全模式系统,安全模式系统用于对重要数据进行加密。Specifically, the first operating system is a normal mode system; the second operating system is a security mode system, and the security mode system is used to encrypt important data.

在这里,终端包括但不限于手机、平板电脑、笔记本电脑、台式电脑、车载电脑、智能手表、智能手环、其他可穿戴智能设备以及POS机等。Here, terminals include but are not limited to mobile phones, tablet computers, notebook computers, desktop computers, in-vehicle computers, smart watches, smart bracelets, other wearable smart devices, and POS machines.

上述提供的一种操作系统的切换方法,获取用户的指纹信息;根据指纹信息解析得到指纹信息的待匹配指纹特征;判断待匹配指纹特征是否为终端预存的指纹特征数据库中的标准指纹特征;若是,获取用户的身份识别信息;根据身份识别信息解析得到身份识别信息的待匹配身份识别特征;判断待匹配身份识别特征是否为终端预存的身份识别特征数据库中的标准身份识别特征;若是,切换终端的操作系统。通过在终端预设指纹特征数据库以及身份识别特征数据库,当获取到的指纹信息解析为指纹特征且可以匹配指纹特征数据库中的标准指纹特征时,获取身份识别信息,当获取到的身份识别信息解析为身份识别特征且可以匹配身份识别特征数据库中的标准身份识别特征时,满足系统切换的条件,系统由第一系统切换至第二系统;这种切换系统的方式保密性强,不会暴露终端具有双系统,满足了用户的使用要求。The method for switching an operating system provided above is to obtain the fingerprint information of the user; to analyze and obtain the fingerprint feature to be matched of the fingerprint information according to the fingerprint information; to determine whether the fingerprint feature to be matched is the standard fingerprint feature in the fingerprint feature database pre-stored by the terminal; , obtain the user's identification information; parse the identification information to obtain the identification features to be matched according to the identification information; determine whether the identification features to be matched are the standard identification features in the identification feature database pre-stored by the terminal; if so, switch the terminal operating system. By presetting the fingerprint feature database and the identification feature database on the terminal, when the acquired fingerprint information is parsed into fingerprint features and can match the standard fingerprint features in the fingerprint feature database, the identification information is obtained, and when the acquired identification information is analyzed When it is an identification feature and can match the standard identification feature in the identification feature database, the conditions for system switching are met, and the system is switched from the first system to the second system; this method of switching systems is highly confidential and will not expose the terminal. With dual systems, it meets the requirements of users.

请参阅图2,在一些实施方式中,操作系统的切换方法还包括:Referring to FIG. 2, in some embodiments, the operating system switching method further includes:

步骤S10、获取用户的指纹持续按压终端的指纹感应元件的按压时长。Step S10 , acquiring the pressing duration of the user's fingerprint continuously pressing the fingerprint sensing element of the terminal.

具体地,指纹感应元件设置于感应平面以及电路板之间,用以感应放置于该感应平面上的手指的指纹影像。Specifically, the fingerprint sensing element is disposed between the sensing plane and the circuit board for sensing the fingerprint image of the finger placed on the sensing plane.

步骤S20、判断所述按压时长是否超过预设阈值。Step S20, judging whether the pressing duration exceeds a preset threshold.

具体地,如果所述按压时长超过预设阈值,则执行步骤S30。Specifically, if the pressing duration exceeds a preset threshold, step S30 is performed.

需要说明的是,这里的按压时长超过预设阈值作为操作系统切换的触发开关存在。预设阈值可以设定为一个不是经常性会达到的时长,以免在日常因为其他原因按压指纹感应元件时误开系统切换开关。It should be noted that the pressing duration here exceeds the preset threshold and exists as a trigger switch for operating system switching. The preset threshold can be set to a time period that is not frequently reached, so as to avoid accidentally turning on the system switch when the fingerprint sensor is pressed for other reasons.

请参阅图2,在一些实施方式中,操作系统的切换方法还包括:Referring to FIG. 2, in some embodiments, the operating system switching method further includes:

若待匹配指纹特征不是终端预存的指纹特征数据库中的标准指纹特征,则退出校验,终端维持原系统。If the fingerprint feature to be matched is not the standard fingerprint feature in the fingerprint feature database pre-stored by the terminal, the verification is exited, and the terminal maintains the original system.

请参阅图2,在一些实施方式中,操作系统的切换方法还包括:Referring to FIG. 2, in some embodiments, the operating system switching method further includes:

若待匹配身份识别特征不是终端预存的身份识别特征数据库中的标准身份特征,则退出校验,终端维持原系统。If the identification feature to be matched is not the standard identification feature in the identification feature database pre-stored by the terminal, the verification is exited, and the terminal maintains the original system.

请参阅图3,图3示出了本发明实施例提供的一种操作系统的切换装置的结构示意性框图;本申请的实施例提供的一种操作系统的切换装置,可以配置于终端或服务器中,用于执行前述的操作系统的切换方法。该操作系统的切换装置包括:Please refer to FIG. 3. FIG. 3 shows a schematic block diagram of the structure of an operating system switching device provided by an embodiment of the present invention; an operating system switching device provided by an embodiment of the present application may be configured on a terminal or a server , for executing the aforementioned operating system switching method. The switching device of the operating system includes:

第一获取单元1,用于获取用户的指纹信息;The first obtaining unit 1 is used to obtain the fingerprint information of the user;

第一解析单元2,用于根据所述指纹信息解析得到所述指纹信息的待匹配指纹特征;A first parsing unit 2, configured to analyze and obtain fingerprint features to be matched of the fingerprint information according to the fingerprint information;

第一判断单元3,用于判断所述待匹配指纹特征是否为所述终端预存的指纹特征数据库中的标准指纹特征;The first judging unit 3 is used for judging whether the fingerprint feature to be matched is a standard fingerprint feature in the fingerprint feature database pre-stored by the terminal;

第二获取单元4,用于当所述第一判断单元判断所述待匹配指纹特征为所述终端预存的指纹特征数据库中的标准指纹特征时获取用户的身份识别信息;a second obtaining unit 4, configured to obtain the user's identification information when the first judgment unit judges that the fingerprint feature to be matched is a standard fingerprint feature in the fingerprint feature database pre-stored by the terminal;

第二解析单元5,用于根据所述身份识别信息解析得到所述身份识别信息的待匹配身份识别特征;A second parsing unit 5, configured to parse and obtain the to-be-matched identification feature of the identification information according to the identification information;

第二判断单元6,用于判断所述待匹配身份识别特征是否为所述终端预存的身份识别特征数据库中的标准身份识别特征;The second judgment unit 6 is used for judging whether the identification feature to be matched is a standard identification feature in the identification feature database pre-stored by the terminal;

切换单元7,用于当所述第二判断单元判断所述身份识别特征为终端预存的身份识别特征数据库中的标准身份识别特征时,切换所述终端的操作系统。The switching unit 7 is configured to switch the operating system of the terminal when the second judging unit judges that the identification feature is a standard identification feature in the identification feature database pre-stored by the terminal.

需要说明的是,请参阅图4,所述装置还包括:It should be noted that, referring to FIG. 4 , the device further includes:

按压时长获取单元8,用于获取用户的指纹持续按压所述终端的指纹感应元件的按压时长;a pressing duration acquisition unit 8, configured to acquire the pressing duration of the user's fingerprint continuously pressing the fingerprint sensing element of the terminal;

按压时长判断单元9,用于判断所述按压时长是否超过预设阈值,其中,若所述按压时长判断单元判断所述按压时长超过预设阈值,所述第一获取单元将获取用户的指纹信息。The pressing duration judging unit 9 is used to judge whether the pressing duration exceeds a preset threshold, wherein, if the pressing duration judging unit determines that the pressing duration exceeds the preset threshold, the first obtaining unit will obtain the fingerprint information of the user .

需要说明的是,所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的装置和各单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。It should be noted that those skilled in the art can clearly understand that, for the convenience and brevity of the description, the specific working process of the device and each unit described above may refer to the corresponding process in the foregoing method embodiments, which is not repeated here. Repeat.

上述的装置可以实现为一种计算机程序的形式,该计算机程序可以在计算机设备上运行。The above-described apparatus can be implemented in the form of a computer program that can be run on a computer device.

该计算机设备可以是终端。本发明实施例提供的一种终端,包括处理器和存储器;其中,存储器可以包括非易失性存储介质和内存储器。The computer device may be a terminal. A terminal provided by an embodiment of the present invention includes a processor and a memory; wherein, the memory may include a non-volatile storage medium and an internal memory.

处理器用于提供计算和控制能力,支撑整个计算机设备的运行。The processor is used to provide computing and control capabilities to support the operation of the entire computer equipment.

非易失性存储介质可存储操作系统和计算机程序。该计算机程序包括程序指令,该程序指令被执行时,可使得处理器执行任意一种操作系统的切换方法。The nonvolatile storage medium can store operating systems and computer programs. The computer program includes program instructions, which, when executed, can cause the processor to execute any operating system switching method.

内存储器为非易失性存储介质中的计算机程序的运行提供环境,该计算机程序被处理器执行时,可使得处理器执行任意一种操作系统的切换方法。The internal memory provides an environment for running the computer program in the non-volatile storage medium, and when the computer program is executed by the processor, the processor can execute any operating system switching method.

应当理解的是,处理器可以是中央处理单元(CentralProcessingUnit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(DigitalSignalProcessor,DSP)、专用集成电路(ApplicationSpecificIntegratedCircuit,ASIC)、现场可编程门阵列(Field-ProgrammableGateArray,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。其中,通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that the processor may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-available processors Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. Wherein, the general-purpose processor can be a microprocessor or the processor can also be any conventional processor or the like.

本申请的实施例中还提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序中包括程序指令,所述处理器执行所述程序指令,实现本申请实施例提供的任意一种操作系统的切换方法。该程序执行时可包括本发明提供的一种操作系统的切换方法各实施例中的部分或全部步骤。The embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores a computer program, the computer program includes program instructions, and the processor executes the program instructions to implement the present application Any operating system switching method provided in the embodiment. When the program is executed, it may include some or all of the steps in the various embodiments of the operating system switching method provided by the present invention.

其中,所述计算机可读存储介质可以是前述实施例所述的终端的内部存储单元,例如所述终端的硬盘或内存。所述计算机可读存储介质也可以是所述计算机设备的外部存储设备,例如所述终端上配备的插接式硬盘,智能存储卡(SmartMediaCard,SMC),安全数字(SecureDigital,SD)卡,闪存卡(FlashCard)等。Wherein, the computer-readable storage medium may be an internal storage unit of the terminal described in the foregoing embodiments, such as a hard disk or a memory of the terminal. The computer-readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk equipped on the terminal, a smart memory card (SmartMediaCard, SMC), a secure digital (SecureDigital, SD) card, flash memory Card (FlashCard) and so on.

以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention and are not intended to limit the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention shall be included in the protection of the present invention. within the range.

Claims (10)

1. A switching method of an operating system is applied to a terminal, the terminal is provided with at least a first operating system and a second operating system which can be switched back and forth, and the switching method comprises the following steps:
acquiring fingerprint information of a user;
analyzing according to the fingerprint information to obtain the fingerprint characteristics to be matched of the fingerprint information;
judging whether the fingerprint features to be matched are standard fingerprint features in a fingerprint feature database prestored in the terminal;
if so, acquiring the identity identification information of the user;
analyzing according to the identity recognition information to obtain identity recognition features to be matched of the identity recognition information;
judging whether the identification features to be matched are standard identification features in an identification feature database prestored in the terminal;
and if so, switching the operating system of the terminal.
2. The method of switching an operating system according to claim 1, wherein the switching method further comprises:
acquiring the pressing duration of the fingerprint sensing element of the terminal continuously pressed by the fingerprint of the user;
judging whether the pressing time length exceeds a preset threshold value or not;
and if so, acquiring the fingerprint information of the user.
3. The method for switching operating systems according to claim 1, wherein the first operating system is a normal mode system; the second operating system is a secure mode system for encrypting important data.
4. The method of claim 1, wherein the identification information comprises one or more of voiceprint information, facial information, iris information, and body impedance information.
5. The method of switching an operating system according to claim 1, wherein the switching method further comprises:
and if the fingerprint features to be matched are not the standard fingerprint features in the fingerprint feature database prestored in the terminal, quitting the verification, and maintaining the original system by the terminal.
6. The method of switching an operating system according to claim 1, wherein the switching method further comprises:
and if the identification features to be matched are not the standard identification features in the identification feature database prestored in the terminal, quitting the verification, and maintaining the original system by the terminal.
7. A switching device of an operating system, applied to a terminal having at least a first operating system and a second operating system that can be switched back and forth, the switching device comprising:
the first acquisition unit is used for acquiring fingerprint information of a user;
the first analysis unit is used for analyzing the fingerprint information to obtain the fingerprint features to be matched of the fingerprint information;
the first judgment unit is used for judging whether the fingerprint features to be matched are standard fingerprint features in a fingerprint feature database prestored in the terminal;
the second acquisition unit is used for acquiring the identity identification information of the user when the first judgment unit judges that the fingerprint features to be matched are standard fingerprint features in a fingerprint feature database prestored in the terminal;
the second analysis unit is used for analyzing the identity recognition information to obtain the identity recognition features to be matched of the identity recognition information;
the second judging unit is used for judging whether the identification features to be matched are standard identification features in an identification feature database prestored in the terminal;
and the switching unit is used for switching the operating system of the terminal when the second judging unit judges that the identification features are standard identification features in an identification feature database prestored in the terminal.
8. The switching apparatus of an operating system according to claim 7, wherein said apparatus further comprises:
the pressing duration acquisition unit is used for acquiring the pressing duration of the fingerprint sensing element of the terminal continuously pressed by the fingerprint of the user;
the pressing duration judging unit is used for judging whether the pressing duration exceeds a preset threshold value, and if the pressing duration judging unit judges that the pressing duration exceeds the preset threshold value, the first acquiring unit acquires the fingerprint information of the user.
9. A terminal, characterized in that the terminal comprises a memory and a processor;
the memory stores a computer program;
the processor is configured to execute the computer program and implement the switching method of the operating system according to any one of claims 1 to 6 when executing the computer program.
10. A readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the switching method of an operating system of any one of claims 1 to 6.
CN202010679897.0A 2020-07-15 2020-07-15 Operating system switching method, device, terminal and readable storage medium Pending CN111880848A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010679897.0A CN111880848A (en) 2020-07-15 2020-07-15 Operating system switching method, device, terminal and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010679897.0A CN111880848A (en) 2020-07-15 2020-07-15 Operating system switching method, device, terminal and readable storage medium

Publications (1)

Publication Number Publication Date
CN111880848A true CN111880848A (en) 2020-11-03

Family

ID=73151462

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010679897.0A Pending CN111880848A (en) 2020-07-15 2020-07-15 Operating system switching method, device, terminal and readable storage medium

Country Status (1)

Country Link
CN (1) CN111880848A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112766759A (en) * 2021-01-25 2021-05-07 深圳市广程杰瑞科技有限公司 Refueling management method and system for logistics enterprises
CN115018834A (en) * 2022-08-08 2022-09-06 山东光岳九州半导体科技有限公司 Semiconductor wafer image alignment method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120154413A1 (en) * 2010-12-21 2012-06-21 Dongwoo Kim Mobile terminal and method of controlling a mode switching therein
CN105335641A (en) * 2015-10-16 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and device based on fingerprint identification
CN105843681A (en) * 2016-03-24 2016-08-10 捷开通讯(深圳)有限公司 Mobile terminal and operating system switching method thereof
CN106250741A (en) * 2016-07-22 2016-12-21 北京珠穆朗玛移动通信有限公司 A kind of system switching method and mobile terminal
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 Intelligent terminal mode switching method and device
CN107621921A (en) * 2017-08-03 2018-01-23 广东小天才科技有限公司 Application program starting method and mobile device
CN109815668A (en) * 2019-01-10 2019-05-28 北京珠穆朗玛移动通信有限公司 Dual system method for controlling mobile terminal, mobile terminal and storage medium
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120154413A1 (en) * 2010-12-21 2012-06-21 Dongwoo Kim Mobile terminal and method of controlling a mode switching therein
CN105335641A (en) * 2015-10-16 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and device based on fingerprint identification
CN105843681A (en) * 2016-03-24 2016-08-10 捷开通讯(深圳)有限公司 Mobile terminal and operating system switching method thereof
CN106250741A (en) * 2016-07-22 2016-12-21 北京珠穆朗玛移动通信有限公司 A kind of system switching method and mobile terminal
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 Intelligent terminal mode switching method and device
CN107621921A (en) * 2017-08-03 2018-01-23 广东小天才科技有限公司 Application program starting method and mobile device
CN109815668A (en) * 2019-01-10 2019-05-28 北京珠穆朗玛移动通信有限公司 Dual system method for controlling mobile terminal, mobile terminal and storage medium
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112766759A (en) * 2021-01-25 2021-05-07 深圳市广程杰瑞科技有限公司 Refueling management method and system for logistics enterprises
CN112766759B (en) * 2021-01-25 2022-06-17 深圳市广程杰瑞科技有限公司 Refueling management method and system for logistics enterprises
CN115018834A (en) * 2022-08-08 2022-09-06 山东光岳九州半导体科技有限公司 Semiconductor wafer image alignment method
CN115018834B (en) * 2022-08-08 2022-10-25 山东光岳九州半导体科技有限公司 Semiconductor wafer image alignment method

Similar Documents

Publication Publication Date Title
CN107438854B (en) System and method for performing fingerprint-based user authentication using images captured by a mobile device
US9189686B2 (en) Apparatus and method for iris image analysis
RU2697646C1 (en) Method of biometric authentication of a user and a computing device implementing said method
Anthony et al. A review of face anti-spoofing methods for face recognition systems
CN110287918B (en) Living body identification method and related products
CN111344701A (en) Start control method and start control system of intelligent terminal
CN112016525A (en) Non-contact fingerprint acquisition method and device
Tiwari et al. A touch-less fingerphoto recognition system for mobile hand-held devices
CN113743371B (en) Fingerprint identification method and fingerprint identification device
Patil et al. The comparison of iris recognition using principal component analysis, log gabor and gabor wavelets
Majekodunmi et al. A review of the fingerprint, speaker recognition, face recognition and iris recognition based biometric identification technologies
CN111880848A (en) Operating system switching method, device, terminal and readable storage medium
Beton et al. Biometric secret path for mobile user authentication: A preliminary study
Moco et al. Smartphone-based palmprint recognition system
Ives et al. Iris recognition using the ridge energy direction (RED) algorithm
Dewangan Human authentication using biometric recognition
Sisodia et al. A conglomerate technique for finger print recognition using phone camera captured images
Hasan et al. Dual iris matching for biometric identification
Gawande et al. Improving iris recognition accuracy by score based fusion method
KR100847142B1 (en) Preprocessing method for face recognition, face recognition method and apparatus using same
Saravanan et al. Iris authentication through gabor filter using DSP processor
Amali et al. Evolution of Deep Learning for Biometric Identification and Recognition
Jadhav et al. Information extraction for touch free biometric authentication system from large databases using deep learning algorithm
Choras A review of image processing methods and biometric trends for personal authentication and identification
Dixit et al. SIFRS: Spoof Invariant Facial Recognition System (A Helping Hand for Visual Impaired People)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201103

RJ01 Rejection of invention patent application after publication