METHOD AND APPARATUS FOR FINGERPRINT IDENTIFICATION
First Claim
Patent Images
1. An electronic device, comprising:
- a processor-readable storage medium comprising a set of instructions for image identification; and
a processor in communication with the storage medium, wherein the processor is configured to;
obtain a target image for authorization of a target event though image identification;
obtain a target security requirement associated with the target event from a plurality of levels of security requirements;
determine whether the target image is successfully identified based on the target security requirement; and
operate the target event when the target image is successfully identified.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for fingerprint identification includes acquiring a fingerprint image and extracting feature information of the fingerprint image, obtaining current operation information and obtaining a feature threshold corresponding to a security level of fingerprint identification based on the current operation information, and comparing the feature information with verification feature information stored in advance. Fingerprint identification succeeds if the comparison satisfies a comparison threshold and the fingerprint identification fails if the comparison fails to satisfy the comparison threshold.
-
Citations
20 Claims
-
1. An electronic device, comprising:
-
a processor-readable storage medium comprising a set of instructions for image identification; and a processor in communication with the storage medium, wherein the processor is configured to; obtain a target image for authorization of a target event though image identification; obtain a target security requirement associated with the target event from a plurality of levels of security requirements; determine whether the target image is successfully identified based on the target security requirement; and operate the target event when the target image is successfully identified. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for image identification, comprising:
-
obtaining, by a mobile terminal, a target image for authorization of a target event though image identification; selecting, by the mobile terminal, a target security requirement associated with the target event from a plurality of levels of security requirements; determining, by the mobile terminal, whether the target image is successfully identified based on the selected target security requirement; and operating, by the mobile terminal, the target event when the target image is successfully identified. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A processor-readable non-transitory storage medium, comprising a set of instruction for image identification, wherein when executed by a processor the set of instruction directs the processor to:
-
obtain a target image for authorization of a target event though image identification; obtain a target security requirement associated with the target event from a plurality of levels of security requirements; determine whether the target image is successfully identified based on the target security requirement; and operate the target event when the target image is successfully identified. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification