Method and device for identity verification
First Claim
Patent Images
1. A method for identity verification, comprising:
- collecting a target fingerprint of a user for the identity verification;
acquiring a fingerprint verification rule corresponding to a security level of the identity verification;
performing a verification of the target fingerprint based on the fingerprint verification rule, by comparing the target fingerprint with a corresponding legal fingerprint among a plurality of different legal fingerprints of the user, wherein each of the plurality of different legal fingerprints corresponds to a respective security level of the identity verification; and
confirming that the identity verification is successful when the target fingerprint is verified,wherein collecting the target fingerprint comprises;
triggering a fingerprint recognition sensor when an identity verification instruction sent by an upper-level application is received; and
collecting the target fingerprint by the fingerprint recognition sensor,wherein the identity verification instruction carries the security level of the identity verification, and different security levels for different identify verifications in different application scenes exist for the same upper-level application within an operating system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for identity verification is provided. The method includes: collecting a target fingerprint for the identity verification; acquiring a fingerprint verification rule corresponding to a security level of the identity verification; performing a verification of the target fingerprint based on the fingerprint verification rule; and confirming that the identity verification is successful when the target fingerprint is verified.
8 Citations
13 Claims
-
1. A method for identity verification, comprising:
-
collecting a target fingerprint of a user for the identity verification; acquiring a fingerprint verification rule corresponding to a security level of the identity verification; performing a verification of the target fingerprint based on the fingerprint verification rule, by comparing the target fingerprint with a corresponding legal fingerprint among a plurality of different legal fingerprints of the user, wherein each of the plurality of different legal fingerprints corresponds to a respective security level of the identity verification; and confirming that the identity verification is successful when the target fingerprint is verified, wherein collecting the target fingerprint comprises; triggering a fingerprint recognition sensor when an identity verification instruction sent by an upper-level application is received; and collecting the target fingerprint by the fingerprint recognition sensor, wherein the identity verification instruction carries the security level of the identity verification, and different security levels for different identify verifications in different application scenes exist for the same upper-level application within an operating system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device for identity verification, comprising:
-
a processor; and a memory storing instructions executable by the processor; wherein the processor is configured to; collect a target fingerprint of a user for the identity verification; acquire a fingerprint verification rule corresponding to a security level of the identity verification; perform a verification of the target fingerprint based on the fingerprint verification rule, by comparing the target fingerprint with a corresponding legal fingerprint among a plurality of different legal fingerprints of the user, wherein each of the plurality of different legal fingerprints corresponds to a respective security level of the identity verification; and confirm that the identity verification is successful when the target fingerprint is verified, wherein the processor is further configured to; trigger a fingerprint recognition sensor when an identity verification instruction sent by an upper-level application is received; and collect the target fingerprint by the fingerprint recognition sensor, wherein the identity verification instruction carries the security level of the identity verification, and different security levels for different identify verifications in different application scenes exist for the same upper-level application within an operating system. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium having stored therein instructions that, when executed by a processor of a terminal, cause the terminal to perform a method for identity verification, the method comprising:
-
collecting a target fingerprint of a user for the identity verification; acquiring a fingerprint verification rule corresponding to a security level of the identity verification; performing a verification of the target fingerprint based on the fingerprint verification rule, by comparing the target fingerprint with a corresponding legal fingerprint among a plurality of different legal fingerprints of the user, wherein each of the plurality of different legal fingerprints corresponds to a respective security level of the identity verification; and confirming that the identity verification is successful when the target fingerprint is verified, wherein collecting the target fingerprint comprises; triggering a fingerprint recognition sensor when an identity verification instruction sent by an upper-level application is received; and collecting the target fingerprint by the fingerprint recognition sensor, wherein the identity verification instruction carries the security level of the identity verification, and different security levels for different identify verifications in different application scenes exist for the same upper-level application within an operating system.
-
Specification