CN104778393A - Security fingerprint identification method for intelligent terminal - Google Patents

Security fingerprint identification method for intelligent terminal Download PDF

Info

Publication number
CN104778393A
CN104778393A CN201510179446.XA CN201510179446A CN104778393A CN 104778393 A CN104778393 A CN 104778393A CN 201510179446 A CN201510179446 A CN 201510179446A CN 104778393 A CN104778393 A CN 104778393A
Authority
CN
China
Prior art keywords
fingerprint
operating system
secure operating
identification module
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510179446.XA
Other languages
Chinese (zh)
Inventor
杨霞
桑楠
刘志伟
石鹏
雷林
孙超群
孙海泳
任飞
吴开均
刘维飞
武琼
袁艺
杨姗
李昊星
唐伟文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201510179446.XA priority Critical patent/CN104778393A/en
Publication of CN104778393A publication Critical patent/CN104778393A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

The invention provides a security fingerprint identification method for an intelligent terminal, in particular to a security method for fingerprint identification under a chip-level security system framework. Extracted fingerprint characteristics are encrypted and stored on an isolating zone; by means of the isolating zone, the privacy for sensitive operation of fingerprint image data is effectively guaranteed, and the security of the fingerprint identification of the intelligent terminal is greatly improved.

Description

A kind of security fingerprint recognition methods of intelligent terminal
Technical field
The present invention relates to Technology On Data Encryption and intelligent terminal technology.
Background technology
At present; the fingerprinting scheme of mobile terminal mainly completes the authentication to user by third party's fingerprint recognition chip; because the associative operation of third-party fingerprint recognition chip to the finger print data of user completes under the normal operating system environment such as Android; for this sensitivity of fingerprint and for unique biological information; the finger print information of user does not obtain strong safeguard protection, very likely by malice program intercept and capture.
Summary of the invention
Technical matters to be solved by this invention is, provides a kind of security fingerprint recognition methods being applicable to intelligent terminal that can prevent being intercepted and captured by malicious application.
The present invention is that a kind of security fingerprint recognition methods of intelligent terminal, comprises the following steps for solving the problems of the technologies described above adopted technical scheme:
1) fingerprint register:
1-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint view data of the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, normal operating system is switched to secure operating system; Described secure operating system is the operating system run in the Secure isolation region of intelligent terminal embedded hardware;
1-2) key being used for cryptographic fingerprint view data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By monitoring module, secure operating system is switched to normal operating system;
1-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint view data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract the fingerprint characteristic of fingerprint characteristic as registered user after the fingerprint identification module decrypt fingerprint view data of 1-4) secure operating system, then store after internal cryptographic is carried out to the fingerprint characteristic of registered user; By monitoring module, secure operating system is switched to normal operating system;
2) fingerprint authentication:
2-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint view data of the fingerprint identification module of secure operating system; By monitoring module, normal operating system is switched to secure operating system;
2-2) key being used for cryptographic fingerprint view data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, secure operating system is switched to normal operating system;
2-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint view data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract fingerprint characteristic after the fingerprint identification module decrypt fingerprint view data of 2-4) secure operating system, then the fingerprint characteristic of inner deciphering registered user mates, and obtains fingerprint similarity result; By monitoring module, secure operating system is switched to normal operating system;
2-5) fingerprint identification module of normal operating system obtains similarity result and threshold value multilevel iudge whether the match is successful, and when similarity result is greater than threshold value, then the match is successful, otherwise it fails to match.
The invention has the beneficial effects as follows, provide the safety method of the fingerprint recognition under a kind of security system framework of chip-scale, the fingerprint characteristic cryptographic storage extracted is on area of isolation, to effectively ensure the privacy that the fingerprint image data of sensitivity is operated by means of this area of isolation, improve the security of intelligent terminal field fingerprint recognition greatly.
Accompanying drawing explanation
Fig. 1 be fingerprint recognition of the present invention based on system framework figure;
Fig. 2 is fingerprint identification module frame diagram in secure operating system.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is further described in detail:
Fig. 1 intelligent terminal system is that an embedded system 100 with area of isolation comprises general spatial region 101 and isolation safe region, space 102.Operating system design of the present invention is the operating system of the space isolation of two parallel runnings, be not operate in general spatial region 101 non-secure operating system 103 and operate in the secure operating system 107 in isolation safe region, space 102 and be responsible for the monitor program 110 that non-secure operating system and secure operating system change.Embedded platform is positioned on operating system, for application development provides interface.
The non-secure operating system in general spatial region runs fingerprint recognition program 105 and other application 104.The non-secure operating system (normal operating system) 103 in general spatial region refers to the operating system on the intelligent terminal being mounted in current main flow, and the present embodiment is for android system.This normal operating system can be installed from Android application market and other application programs of not trusted of part, so the security of this operating system can not be guaranteed, if the critical data resource of process user, its security more can not be guaranteed.Operate in this fingerprint recognition program environmentally, obtain the information in fingerprint of user by fingerprint image acquisition device and send request to secure operating system, to obtain the shared key of its storage inside, fingerprint image data after utilizing AES-256 symmetric encipherment algorithm to decaptitate to it is afterwards encrypted, and by monitor program, ciphertext is transferred to secure operating system inside and processes;
Insulating space environmentally runs fingerprint recognition service safe process 109 and other security services 108.Under secure operating system herein refers to the security context operating in the processor with space isolation features, by opening up one piece of believable code area in CPU core inside, mainly completing the starting factor of secure operating system on insulating space region and judge according to the Service Request Identifiers of insecure environments and create the operations such as the loading startup of operating system non-security on corresponding security service process and general spatial region.Operate in this fingerprint recognition service safe process environmentally, by the fingerprint image data ciphertext that deciphering acquisition non-secure operating system imports into, utilize inner fingerprint image Processing Algorithm afterwards, carry out the operation such as encryption access, fingerprint minutiae matching of RSA-2048 asymmetric arithmetic of the pre-service of fingerprint image data, feature extraction, feature templates, complete all operations of fingerprint identification process, and by monitor program, matching result is returned to the fingerprint recognition program operated on non-secure operating system;
Be responsible for the monitor program mark 110 that two area of space switch, under operating in monitor environment, be responsible for the running environment of handover security operating system and non-secure operating system, the running state information of system environments when storing and recover to switch; The tie TrustZone access control connecting monitor program in non-secure operating system and secure operating system drives mark 106.
Fig. 2 is for having fingerprint recognition security mechanism figure in secure operating system, comprise and may be used for carrying out the encryption/decryption module 112 of encryption and decryption operation, finger print data pretreatment module 113 and fingerprint minutiae matching module 114 to fingerprint image data and fingerprint characteristic, comprise fingerprint characteristic data storehouse 115 and fingerprint minutiae matching computing module 116 in fingerprint minutiae matching module 114, in fingerprint characteristic data storehouse 115, include secure storage module 117.
Fingerprint identification module in normal operating system is for running fingerprint recognition program;
Fingerprint identification module in secure operating system is for running fingerprint recognition service safe process;
Encryption/decryption module in secure operating system fingerprint identification module stores for providing key that between normal operating system and secure operating system, safe transmission fingerprint image data adopts and secure operating system to carry out to fingerprint characteristic the key that inner encryption and decryption adopts.
The carrying out practically flow process of the fingerprint recognition safety method of intelligent terminal is as follows:
Fingerprint register process, comprises step:
Step 101: the collection encryption of fingerprint image data.General spatial region is run fingerprint recognition program, obtain simultaneously and be stored in key area of isolation being used in reference to print image data encryption, when clicking registration button, triggering the fingerprint image data that fingerprint image acquisition device gathers user, and operation is encrypted to it;
This step comprises following idiographic flow:
1.. user triggers Android fingerprint recognition program and runs, and clicks fingerprint register button, carries out user fingerprints registration operation; This application program can apply for one piece of sufficient memory headroom, for depositing the shared key being stored in the inner encryption/decryption module of secure operating system, and sends the key request mark FP_ENCRYPT obtaining and be used for transmission fingerprint view data to secure operating system;
2. this section of memory headroom physical address and request mark can be passed to corresponding register, so that secure operating system carries out assignment operation by .Android fingerprint recognition program; Call Secure Monitor Call (SMC) instruction by performing specific security monitoring, thus switchover operation environment is under monitor environment.Through monitor program judge be services request from Android after, preserve by means of coprocessor the context that the context of current Android and recovery are about to be switched to security context;
3.. when secure operating system listens to the services request from insecure environments, then can read the parameter value that monitor stores, and inner defined service identifiers contrasts with it, if be verified, then the host process of secure operating system can create should the fingerprint recognition service safe process of services request, and joined ready queue, wait for scheduling;
4.. secure operating system is dispatched and is run fingerprint recognition service safe process, create the secured session of fingerprint recognition service, thus the security service instant teaching of the application program of fingerprint recognition and fingerprint recognition is got up, service command mark FP_ENCRYPT according to fingerprint recognition calls corresponding function, the obtained shared key being used for encrypting actual fingerprint view data be written to by fingerprint encryption/decryption module memory headroom that Android fingerprint recognition program opens up and the ident value of corresponding registers is set, performing SMC instruction and be trapped in monitor environment;
5.. first monitor program reads the ident value of corresponding registers, to judge that current MONITOR MODE is switched by security context, monitor program can preserve the context environmental of secure operating system by coprocessor afterwards, and the context environmental of Android before recovering.Now, Android fingerprint recognition program then successfully obtains the shared key being used for transmission fingerprint view data;
6.. user will point light press fingerprint image acquisition device, first the size of the fingerprint image of collection be compared with the fingerprint image threshold value preset, if be greater than threshold value, then represent fingerprint collecting success, otherwise Resurvey fingerprint; The fingerprint image collected can be read afterwards, by reading the header information of fingerprint image, as the information such as type, resolution of image file, judge the validity of the fingerprint image collected, if be verified, then remove this fingerprint image file unnecessary header information, only retain actual fingerprint image data information to reduce the data volume of encrypting fingerprint; Flow process is 5. obtained shared key is used to be encrypted operation to the actual fingerprint view data after decaptitating above finally by calling AES-256 symmetric encipherment algorithm, fingerprint image data is existed with the form of ciphertext, thus effectively avoid user fingerprint image data rob by rogue program and obtain;
Step 102: the safe transmission of fingerprint image data.Preserve the running status of current system, the fingerprint image data of the sensitivity of having encrypted is delivered to area of isolation, is switched to secure execution environments;
This step comprises following idiographic flow:
1. .Android fingerprint recognition program can apply for one piece of sufficient memory headroom, for depositing the ciphertext of the fingerprint image data that will pass to secure operating system, the request mark FP_STORAGE of fingerprint recognition operation and fingerprint characteristic ciphertext event memory, the physical address of this section of memory headroom and request are identified stored in corresponding registers;
2.. perform SMC instruction, be trapped in monitor environment.Now monitor program can read the value of corresponding registers to judge whether the execution of this monitor program is because the security service of Android request call, if be verified, by the Service Request Identifiers FP_STORAGE of insecure environments, stored in corresponding registers, for secure operating system access, the context and recovering that simultaneously coprocessor can preserve current Android be about to be switched to the context of security context;
Step 103: the safe storage of fingerprint characteristic.The fingerprint recognition service safe process that insulating space region is run, first by the fingerprint encrypt data of inner encryption/decryption module deciphering acquisition, call finger print data pretreatment module, secure storage module successively afterwards, complete the making of fingerprint characteristic template base, by user fingerprints registering characteristics in fingerprint characteristic template base, the fingerprint matching for user operates;
This step comprises following idiographic flow:
1.. the fingerprint recognition service safe process of secure operating system utilizes its inner encryption/decryption module 112, by means of symmetric encipherment algorithm shared key, process is decrypted to fingerprint encrypt data, with the actual fingerprint image data information after decaptitating in obtaining step 101;
2.. in the fingerprint recognition service safe process of secure operating system, fingerprint data preprocessing module 113 is to pretreatment operation such as the fingerprint image data of reality successively smoothing noise reduction, picture field calculating, foreground segmentation, directional filtering, binaryzation, refinement, extraction eigenwerts, finally successfully obtains the fingerprint characteristic of user;
3.. first the fingerprint recognition service safe process of secure operating system can utilize the RSA-2048 PKI in encryption/decryption module 112, use rivest, shamir, adelman to flow process 2. in the fingerprint characteristic value that extracts carry out internal cryptographic process, fingerprint characteristic ciphertext after internal cryptographic can be stored into by secure storage module 117 in the file system of the secure operating system operating in space isolation afterwards, by the collection of accumulative execution fingerprint register operation repeatedly and the fingerprint characteristic of user obtained after process, perform identical cryptographic storage operation, thus at secure operating system Inner Constitution for the fingerprint characteristic template base 115 of fingerprint recognition security service,
4.. the result after the success of fingerprint template safe storage is written on the memory headroom that Android fingerprint recognition program opens up, and the ident value of corresponding registers is set, perform specific instruction and be trapped in monitor environment;
5.. read flow process 4. in register identification value, determine that current MONITOR MODE is switched by security context, the context of Android before also being recovered by the context of coprocessor preservation secure operating system again, registering result returns to Android fingerprint recognition program the most at last, the success of prompting fingerprint register;
So far, the fingerprint register operation of fingerprint recognition all completes.Successfully erect fingerprint characteristic template base, in order to the matching operation of fingerprint recognition afterwards, fingerprint characteristic template base has been stored on the area of isolation of space with the form of ciphertext, and this will ensure the safety of user fingerprints information greatly.
Described fingerprint matching process, comprises step:
Step 201: the collection encryption of fingerprint image data.The same with registration process, general spatial region is run fingerprint recognition program, obtain simultaneously and be stored in key area of isolation being used in reference to print image data encryption, when clicking coupling button, trigger the fingerprint image data that fingerprint image acquisition device gathers user, and operation is encrypted to it;
Step 202: the safe transmission of fingerprint image data.Preserve the running status of current system, the fingerprint image data of the sensitivity of having encrypted is delivered to area of isolation, is switched to secure execution environments;
This step comprises following idiographic flow:
1. .Android fingerprint recognition program can apply for one piece of sufficient memory headroom, for depositing the ciphertext of the fingerprint image data that will pass to secure operating system, the request mark FP_MATCH of fingerprint recognition operation and depositing the fingerprint matching result of fingerprint recognition service safe process in secure operating system, the physical address of this section of memory headroom and request are identified stored in corresponding registers;
2.. perform SMC instruction, be trapped in monitor environment.Now monitor program can read the value of corresponding registers to judge whether the execution of this monitor program is because the security service of Android request call, if be verified, by the Service Request Identifiers FP_MATCH of insecure environments, stored in corresponding registers, for secure operating system access, the context and recovering that simultaneously coprocessor can preserve current Android be about to be switched to the context of security context;
Step 203: the characteristic matching of fingerprint characteristic model and fingerprint characteristic template.The fingerprint recognition service safe process that insulating space region is run, first by the fingerprint encrypt data of inner encryption/decryption module deciphering acquisition, call finger print data pretreatment module 113, fingerprint characteristic template library 115 and fingerprint minutiae matching module 116 afterwards successively, complete the matching operation of fingerprint, the result of fingerprint matching is returned to the fingerprint recognition program that normal areas is run;
This step comprises following idiographic flow:
1.. the fingerprint recognition service safe process of secure operating system utilizes its inner encryption/decryption module 112, is decrypted process by means of symmetric encipherment algorithm shared key to fingerprint encrypt data, to obtain the actual fingerprint image data information after removing head;
2.. finger print data pretreatment module 113, to pretreatment operation such as the fingerprint image data of reality successively smoothing noise reduction, picture field calculating, foreground segmentation, directional filtering, binaryzation, refinement, extraction eigenwerts, finally successfully obtains the fingerprint characteristic of user;
3. the file system of fingerprint recognition service safe process first carry secure operating system, the fingerprint characteristic storehouse cipher-text information of cryptographic storage in read step 103, RSA-2048 private key corresponding in encryption/decryption module can be utilized afterwards, rivest, shamir, adelman is used to be decrypted process to the fingerprint characteristic template base ciphertext read, the fingerprint characteristic registered before successfully obtaining user;
4.. using flow process 2. in the fingerprint characteristic that obtains as fingerprint characteristic model and flow process 3. in the fingerprint characteristic that obtains to carry out the matching operation of fingerprint characteristic successively as fingerprint characteristic template, finally obtain fingerprint similarity result;
5.. by flow process 4. in the fingerprint matching similarity result that obtains write back on the memory headroom that Android fingerprint recognition program opens up, and the ident value of corresponding registers is set, performs specific instruction and be switched to monitor environment;
6.. read flow process 5. in ident value in corresponding register, determine that current monitor environment is switched by security context, then preserve the context of secure operating system and the context of Android before recovery by coprocessor;
7. the result returned after .Android fingerprint recognition program acquisition secure operating system fingerprint recognition service processing, makes comparisons itself and the fingerprint similarity threshold preset, and is greater than this threshold value and then represents fingerprint matching success; Otherwise, fingerprint matching failure.
By means of this Secure isolation region, by to fingerprint image data encrypted transmission to secure operating system, and fingerprint recognition operations all to the pre-service, coupling etc. of this fingerprint image data afterwards all completes in this Secure isolation region, make itself and Android application program completely isolated, obviate potential Android malicious application and rob the possibility obtaining user fingerprint image data, ensure that the safety of fingerprint recognition overall process.
Be only specific embodiment of the invention case above, the security in the recognition methods of intelligent terminal employing fingerprint can be ensured by this invention, ensure that from fingerprint and get the overall process of fingerprint matching to the protection of the finger print data of sensitivity.

Claims (3)

1. a security fingerprint recognition methods for intelligent terminal, is characterized in that, comprise the following steps:
1) fingerprint register:
1-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint data of the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, normal operating system is switched to secure operating system; Described secure operating system is the operating system run in the Secure isolation region of intelligent terminal embedded hardware;
1-2) key being used for cryptographic fingerprint data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By monitoring module, secure operating system is switched to normal operating system;
1-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract the fingerprint characteristic of fingerprint characteristic as registered user after the fingerprint identification module decrypt fingerprint view data of 1-4) secure operating system, then store after internal cryptographic is carried out to the fingerprint characteristic of registered user; By monitoring module, secure operating system is switched to normal operating system;
2) fingerprint authentication:
2-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint data of the fingerprint identification module of secure operating system; By monitoring module, normal operating system is switched to secure operating system;
2-2) key being used for cryptographic fingerprint data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, secure operating system is switched to normal operating system;
2-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract fingerprint characteristic after the fingerprint identification module decrypt fingerprint view data of 2-4) secure operating system, then the fingerprint characteristic of inner deciphering registered user mates, and obtains fingerprint similarity result; By monitoring module, secure operating system is switched to normal operating system;
2-5) fingerprint identification module of normal operating system obtains similarity result and threshold value multilevel iudge whether the match is successful, and when similarity result is greater than threshold value, then the match is successful, otherwise it fails to match.
2. the security fingerprint recognition methods of a kind of intelligent terminal as claimed in claim 1, it is characterized in that, be symmetric cryptography to the encryption method of finger print data, is asymmetric encryption to the encryption method of fingerprint characteristic.
3. the security fingerprint recognition methods of a kind of intelligent terminal as claimed in claim 1, is characterized in that,
After fingerprint image acquisition device gathers fingerprint image data, the header information removed in fingerprint image data uses the key of transmission fingerprint view data to be encrypted to fingerprint image data again.
CN201510179446.XA 2015-04-16 2015-04-16 Security fingerprint identification method for intelligent terminal Pending CN104778393A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510179446.XA CN104778393A (en) 2015-04-16 2015-04-16 Security fingerprint identification method for intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510179446.XA CN104778393A (en) 2015-04-16 2015-04-16 Security fingerprint identification method for intelligent terminal

Publications (1)

Publication Number Publication Date
CN104778393A true CN104778393A (en) 2015-07-15

Family

ID=53619851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510179446.XA Pending CN104778393A (en) 2015-04-16 2015-04-16 Security fingerprint identification method for intelligent terminal

Country Status (1)

Country Link
CN (1) CN104778393A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105356998A (en) * 2015-09-28 2016-02-24 宇龙计算机通信科技(深圳)有限公司 TrustZone-based domain space switching system and method
CN105653924A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Touch screen operation method and device
CN105897417A (en) * 2016-04-01 2016-08-24 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN105956540A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Method, device and electronic device for controlling a fingerprint sensor
WO2017028277A1 (en) * 2015-08-19 2017-02-23 华为技术有限公司 Fingerprint recognition method and mobile terminal
CN106548122A (en) * 2015-09-17 2017-03-29 映智科技股份有限公司 Fingerprint sensing integrated circuit and scrambling encryption method thereof
WO2017067284A1 (en) * 2015-10-19 2017-04-27 广东欧珀移动通信有限公司 Fingerprint information secure call method, apparatus, and mobile terminal
CN106886699A (en) * 2017-01-20 2017-06-23 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN106897596A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN107403152A (en) * 2017-07-19 2017-11-28 大唐终端技术有限公司 High-pass platform TrustZone fingerprint recognition realization method and systems
CN108292335A (en) * 2015-12-24 2018-07-17 维普公司 Biometric device
CN108322307A (en) * 2017-01-16 2018-07-24 中标软件有限公司 Communication system and method between container based on kernel memory sharing
CN108319835A (en) * 2018-01-31 2018-07-24 北京小米移动软件有限公司 User's space access control method, device, equipment and storage medium
CN109753206A (en) * 2017-11-02 2019-05-14 成都鼎桥通信技术有限公司 The system switching method and device of electronic equipment
CN109766681A (en) * 2019-01-11 2019-05-17 苏州国芯科技有限公司 User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing
CN111314475A (en) * 2020-02-21 2020-06-19 北京紫光展锐通信技术有限公司 Session creation method and related equipment
CN111414859A (en) * 2020-03-20 2020-07-14 山东大学 TrustZone-based retina identification method
CN113312607A (en) * 2021-08-02 2021-08-27 飞天诚信科技股份有限公司 Method and system for realizing fingerprint sharing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
WO2008138653A1 (en) * 2007-05-09 2008-11-20 International Business Machines Corporation A method and data processing system to prevent manipulation of computer systems
CN102542444A (en) * 2011-12-22 2012-07-04 大唐微电子技术有限公司 Method, device and system for carrying out identity verification of mobile payment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
WO2008138653A1 (en) * 2007-05-09 2008-11-20 International Business Machines Corporation A method and data processing system to prevent manipulation of computer systems
CN102542444A (en) * 2011-12-22 2012-07-04 大唐微电子技术有限公司 Method, device and system for carrying out identity verification of mobile payment

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10409972B2 (en) 2015-08-19 2019-09-10 Huawei Technologies Co., Ltd. Fingerprint recognition method and mobile terminal
WO2017028277A1 (en) * 2015-08-19 2017-02-23 华为技术有限公司 Fingerprint recognition method and mobile terminal
CN106548122B (en) * 2015-09-17 2019-06-07 映智科技股份有限公司 Fingerprint sensing integrated circuit and scrambling encryption method thereof
CN106548122A (en) * 2015-09-17 2017-03-29 映智科技股份有限公司 Fingerprint sensing integrated circuit and scrambling encryption method thereof
WO2017054294A1 (en) * 2015-09-28 2017-04-06 宇龙计算机通信科技(深圳)有限公司 Trustzone-based domain space switching system and method
CN105356998A (en) * 2015-09-28 2016-02-24 宇龙计算机通信科技(深圳)有限公司 TrustZone-based domain space switching system and method
US10713381B2 (en) 2015-10-19 2020-07-14 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and apparatus for securely calling fingerprint information, and mobile terminal
WO2017067284A1 (en) * 2015-10-19 2017-04-27 广东欧珀移动通信有限公司 Fingerprint information secure call method, apparatus, and mobile terminal
CN108292335A (en) * 2015-12-24 2018-07-17 维普公司 Biometric device
CN108292335B (en) * 2015-12-24 2021-11-30 维普公司 Biometric device
CN105653924A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Touch screen operation method and device
CN105897417A (en) * 2016-04-01 2016-08-24 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN105956540A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Method, device and electronic device for controlling a fingerprint sensor
WO2017185672A1 (en) * 2016-04-27 2017-11-02 乐视控股(北京)有限公司 Method and device for controlling fingerprint sensor, and electronic device
CN108322307A (en) * 2017-01-16 2018-07-24 中标软件有限公司 Communication system and method between container based on kernel memory sharing
CN108322307B (en) * 2017-01-16 2021-02-09 中标软件有限公司 Inter-container communication system and method based on kernel memory sharing
CN106886699A (en) * 2017-01-20 2017-06-23 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN106897596A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN107403152A (en) * 2017-07-19 2017-11-28 大唐终端技术有限公司 High-pass platform TrustZone fingerprint recognition realization method and systems
CN107403152B (en) * 2017-07-19 2020-07-31 大唐终端技术有限公司 High-pass platform TrustZone fingerprint identification implementation method and system
CN109753206A (en) * 2017-11-02 2019-05-14 成都鼎桥通信技术有限公司 The system switching method and device of electronic equipment
CN108319835B (en) * 2018-01-31 2020-09-11 北京小米移动软件有限公司 User space access control method, device, equipment and storage medium
CN108319835A (en) * 2018-01-31 2018-07-24 北京小米移动软件有限公司 User's space access control method, device, equipment and storage medium
CN109766681A (en) * 2019-01-11 2019-05-17 苏州国芯科技有限公司 User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing
CN111314475B (en) * 2020-02-21 2021-05-04 北京紫光展锐通信技术有限公司 Session creation method and related equipment
CN111314475A (en) * 2020-02-21 2020-06-19 北京紫光展锐通信技术有限公司 Session creation method and related equipment
CN111414859A (en) * 2020-03-20 2020-07-14 山东大学 TrustZone-based retina identification method
CN113312607A (en) * 2021-08-02 2021-08-27 飞天诚信科技股份有限公司 Method and system for realizing fingerprint sharing

Similar Documents

Publication Publication Date Title
CN104778393A (en) Security fingerprint identification method for intelligent terminal
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
CN105429761B (en) A kind of key generation method and device
WO2017000342A1 (en) Fingerprint recognition method and terminal
US9218473B2 (en) Creation and authentication of biometric information
WO2016110101A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
CN101958892B (en) Electronic data protection method, device and system based on face recognition
CN105069442B (en) A kind of finger print safety cell S E mould group and payment verification method
WO2021004519A1 (en) Data security processing terminal, system and method
CN103646201A (en) Verification method achieved by combining human faces with identities
CN101470783A (en) Identity recognition method and device based on trusted platform module
US10963552B2 (en) Method and electronic device for authenticating a user
CN105281907B (en) Encrypted data processing method and device
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
JP2023139259A (en) Image collection apparatus, server, encryption method, and decryption method
WO2017215533A1 (en) Biological characteristic recognition device and method and biological characteristic template registration method
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
CN103269481A (en) Method and system for encrypting and protecting procedure or file of portable electronic equipment
CN105913252A (en) Fingerprint encrypted EID financial card and realization method
US9710633B2 (en) Method and apparatus for authenticating user
US20230222843A1 (en) Method and device for registering biometric feature
CN105678137A (en) Method and device for identity recognition
CN205354036U (en) Data encryption cloud storage system based on multimode biological identification technique
CN107104968A (en) Safety certifying method, system, terminal and the storage medium of portable finance device
CN105512541A (en) Screen unlocking method, data encryption and decryption methods as well as related devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150715