CN104778393A - Security fingerprint identification method for intelligent terminal - Google Patents
Security fingerprint identification method for intelligent terminal Download PDFInfo
- Publication number
- CN104778393A CN104778393A CN201510179446.XA CN201510179446A CN104778393A CN 104778393 A CN104778393 A CN 104778393A CN 201510179446 A CN201510179446 A CN 201510179446A CN 104778393 A CN104778393 A CN 104778393A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- operating system
- secure operating
- identification module
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Collating Specific Patterns (AREA)
- Image Input (AREA)
Abstract
The invention provides a security fingerprint identification method for an intelligent terminal, in particular to a security method for fingerprint identification under a chip-level security system framework. Extracted fingerprint characteristics are encrypted and stored on an isolating zone; by means of the isolating zone, the privacy for sensitive operation of fingerprint image data is effectively guaranteed, and the security of the fingerprint identification of the intelligent terminal is greatly improved.
Description
Technical field
The present invention relates to Technology On Data Encryption and intelligent terminal technology.
Background technology
At present; the fingerprinting scheme of mobile terminal mainly completes the authentication to user by third party's fingerprint recognition chip; because the associative operation of third-party fingerprint recognition chip to the finger print data of user completes under the normal operating system environment such as Android; for this sensitivity of fingerprint and for unique biological information; the finger print information of user does not obtain strong safeguard protection, very likely by malice program intercept and capture.
Summary of the invention
Technical matters to be solved by this invention is, provides a kind of security fingerprint recognition methods being applicable to intelligent terminal that can prevent being intercepted and captured by malicious application.
The present invention is that a kind of security fingerprint recognition methods of intelligent terminal, comprises the following steps for solving the problems of the technologies described above adopted technical scheme:
1) fingerprint register:
1-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint view data of the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, normal operating system is switched to secure operating system; Described secure operating system is the operating system run in the Secure isolation region of intelligent terminal embedded hardware;
1-2) key being used for cryptographic fingerprint view data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By monitoring module, secure operating system is switched to normal operating system;
1-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint view data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract the fingerprint characteristic of fingerprint characteristic as registered user after the fingerprint identification module decrypt fingerprint view data of 1-4) secure operating system, then store after internal cryptographic is carried out to the fingerprint characteristic of registered user; By monitoring module, secure operating system is switched to normal operating system;
2) fingerprint authentication:
2-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint view data of the fingerprint identification module of secure operating system; By monitoring module, normal operating system is switched to secure operating system;
2-2) key being used for cryptographic fingerprint view data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, secure operating system is switched to normal operating system;
2-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint view data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract fingerprint characteristic after the fingerprint identification module decrypt fingerprint view data of 2-4) secure operating system, then the fingerprint characteristic of inner deciphering registered user mates, and obtains fingerprint similarity result; By monitoring module, secure operating system is switched to normal operating system;
2-5) fingerprint identification module of normal operating system obtains similarity result and threshold value multilevel iudge whether the match is successful, and when similarity result is greater than threshold value, then the match is successful, otherwise it fails to match.
The invention has the beneficial effects as follows, provide the safety method of the fingerprint recognition under a kind of security system framework of chip-scale, the fingerprint characteristic cryptographic storage extracted is on area of isolation, to effectively ensure the privacy that the fingerprint image data of sensitivity is operated by means of this area of isolation, improve the security of intelligent terminal field fingerprint recognition greatly.
Accompanying drawing explanation
Fig. 1 be fingerprint recognition of the present invention based on system framework figure;
Fig. 2 is fingerprint identification module frame diagram in secure operating system.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is further described in detail:
Fig. 1 intelligent terminal system is that an embedded system 100 with area of isolation comprises general spatial region 101 and isolation safe region, space 102.Operating system design of the present invention is the operating system of the space isolation of two parallel runnings, be not operate in general spatial region 101 non-secure operating system 103 and operate in the secure operating system 107 in isolation safe region, space 102 and be responsible for the monitor program 110 that non-secure operating system and secure operating system change.Embedded platform is positioned on operating system, for application development provides interface.
The non-secure operating system in general spatial region runs fingerprint recognition program 105 and other application 104.The non-secure operating system (normal operating system) 103 in general spatial region refers to the operating system on the intelligent terminal being mounted in current main flow, and the present embodiment is for android system.This normal operating system can be installed from Android application market and other application programs of not trusted of part, so the security of this operating system can not be guaranteed, if the critical data resource of process user, its security more can not be guaranteed.Operate in this fingerprint recognition program environmentally, obtain the information in fingerprint of user by fingerprint image acquisition device and send request to secure operating system, to obtain the shared key of its storage inside, fingerprint image data after utilizing AES-256 symmetric encipherment algorithm to decaptitate to it is afterwards encrypted, and by monitor program, ciphertext is transferred to secure operating system inside and processes;
Insulating space environmentally runs fingerprint recognition service safe process 109 and other security services 108.Under secure operating system herein refers to the security context operating in the processor with space isolation features, by opening up one piece of believable code area in CPU core inside, mainly completing the starting factor of secure operating system on insulating space region and judge according to the Service Request Identifiers of insecure environments and create the operations such as the loading startup of operating system non-security on corresponding security service process and general spatial region.Operate in this fingerprint recognition service safe process environmentally, by the fingerprint image data ciphertext that deciphering acquisition non-secure operating system imports into, utilize inner fingerprint image Processing Algorithm afterwards, carry out the operation such as encryption access, fingerprint minutiae matching of RSA-2048 asymmetric arithmetic of the pre-service of fingerprint image data, feature extraction, feature templates, complete all operations of fingerprint identification process, and by monitor program, matching result is returned to the fingerprint recognition program operated on non-secure operating system;
Be responsible for the monitor program mark 110 that two area of space switch, under operating in monitor environment, be responsible for the running environment of handover security operating system and non-secure operating system, the running state information of system environments when storing and recover to switch; The tie TrustZone access control connecting monitor program in non-secure operating system and secure operating system drives mark 106.
Fig. 2 is for having fingerprint recognition security mechanism figure in secure operating system, comprise and may be used for carrying out the encryption/decryption module 112 of encryption and decryption operation, finger print data pretreatment module 113 and fingerprint minutiae matching module 114 to fingerprint image data and fingerprint characteristic, comprise fingerprint characteristic data storehouse 115 and fingerprint minutiae matching computing module 116 in fingerprint minutiae matching module 114, in fingerprint characteristic data storehouse 115, include secure storage module 117.
Fingerprint identification module in normal operating system is for running fingerprint recognition program;
Fingerprint identification module in secure operating system is for running fingerprint recognition service safe process;
Encryption/decryption module in secure operating system fingerprint identification module stores for providing key that between normal operating system and secure operating system, safe transmission fingerprint image data adopts and secure operating system to carry out to fingerprint characteristic the key that inner encryption and decryption adopts.
The carrying out practically flow process of the fingerprint recognition safety method of intelligent terminal is as follows:
Fingerprint register process, comprises step:
Step 101: the collection encryption of fingerprint image data.General spatial region is run fingerprint recognition program, obtain simultaneously and be stored in key area of isolation being used in reference to print image data encryption, when clicking registration button, triggering the fingerprint image data that fingerprint image acquisition device gathers user, and operation is encrypted to it;
This step comprises following idiographic flow:
1.. user triggers Android fingerprint recognition program and runs, and clicks fingerprint register button, carries out user fingerprints registration operation; This application program can apply for one piece of sufficient memory headroom, for depositing the shared key being stored in the inner encryption/decryption module of secure operating system, and sends the key request mark FP_ENCRYPT obtaining and be used for transmission fingerprint view data to secure operating system;
2. this section of memory headroom physical address and request mark can be passed to corresponding register, so that secure operating system carries out assignment operation by .Android fingerprint recognition program; Call Secure Monitor Call (SMC) instruction by performing specific security monitoring, thus switchover operation environment is under monitor environment.Through monitor program judge be services request from Android after, preserve by means of coprocessor the context that the context of current Android and recovery are about to be switched to security context;
3.. when secure operating system listens to the services request from insecure environments, then can read the parameter value that monitor stores, and inner defined service identifiers contrasts with it, if be verified, then the host process of secure operating system can create should the fingerprint recognition service safe process of services request, and joined ready queue, wait for scheduling;
4.. secure operating system is dispatched and is run fingerprint recognition service safe process, create the secured session of fingerprint recognition service, thus the security service instant teaching of the application program of fingerprint recognition and fingerprint recognition is got up, service command mark FP_ENCRYPT according to fingerprint recognition calls corresponding function, the obtained shared key being used for encrypting actual fingerprint view data be written to by fingerprint encryption/decryption module memory headroom that Android fingerprint recognition program opens up and the ident value of corresponding registers is set, performing SMC instruction and be trapped in monitor environment;
5.. first monitor program reads the ident value of corresponding registers, to judge that current MONITOR MODE is switched by security context, monitor program can preserve the context environmental of secure operating system by coprocessor afterwards, and the context environmental of Android before recovering.Now, Android fingerprint recognition program then successfully obtains the shared key being used for transmission fingerprint view data;
6.. user will point light press fingerprint image acquisition device, first the size of the fingerprint image of collection be compared with the fingerprint image threshold value preset, if be greater than threshold value, then represent fingerprint collecting success, otherwise Resurvey fingerprint; The fingerprint image collected can be read afterwards, by reading the header information of fingerprint image, as the information such as type, resolution of image file, judge the validity of the fingerprint image collected, if be verified, then remove this fingerprint image file unnecessary header information, only retain actual fingerprint image data information to reduce the data volume of encrypting fingerprint; Flow process is 5. obtained shared key is used to be encrypted operation to the actual fingerprint view data after decaptitating above finally by calling AES-256 symmetric encipherment algorithm, fingerprint image data is existed with the form of ciphertext, thus effectively avoid user fingerprint image data rob by rogue program and obtain;
Step 102: the safe transmission of fingerprint image data.Preserve the running status of current system, the fingerprint image data of the sensitivity of having encrypted is delivered to area of isolation, is switched to secure execution environments;
This step comprises following idiographic flow:
1. .Android fingerprint recognition program can apply for one piece of sufficient memory headroom, for depositing the ciphertext of the fingerprint image data that will pass to secure operating system, the request mark FP_STORAGE of fingerprint recognition operation and fingerprint characteristic ciphertext event memory, the physical address of this section of memory headroom and request are identified stored in corresponding registers;
2.. perform SMC instruction, be trapped in monitor environment.Now monitor program can read the value of corresponding registers to judge whether the execution of this monitor program is because the security service of Android request call, if be verified, by the Service Request Identifiers FP_STORAGE of insecure environments, stored in corresponding registers, for secure operating system access, the context and recovering that simultaneously coprocessor can preserve current Android be about to be switched to the context of security context;
Step 103: the safe storage of fingerprint characteristic.The fingerprint recognition service safe process that insulating space region is run, first by the fingerprint encrypt data of inner encryption/decryption module deciphering acquisition, call finger print data pretreatment module, secure storage module successively afterwards, complete the making of fingerprint characteristic template base, by user fingerprints registering characteristics in fingerprint characteristic template base, the fingerprint matching for user operates;
This step comprises following idiographic flow:
1.. the fingerprint recognition service safe process of secure operating system utilizes its inner encryption/decryption module 112, by means of symmetric encipherment algorithm shared key, process is decrypted to fingerprint encrypt data, with the actual fingerprint image data information after decaptitating in obtaining step 101;
2.. in the fingerprint recognition service safe process of secure operating system, fingerprint data preprocessing module 113 is to pretreatment operation such as the fingerprint image data of reality successively smoothing noise reduction, picture field calculating, foreground segmentation, directional filtering, binaryzation, refinement, extraction eigenwerts, finally successfully obtains the fingerprint characteristic of user;
3.. first the fingerprint recognition service safe process of secure operating system can utilize the RSA-2048 PKI in encryption/decryption module 112, use rivest, shamir, adelman to flow process 2. in the fingerprint characteristic value that extracts carry out internal cryptographic process, fingerprint characteristic ciphertext after internal cryptographic can be stored into by secure storage module 117 in the file system of the secure operating system operating in space isolation afterwards, by the collection of accumulative execution fingerprint register operation repeatedly and the fingerprint characteristic of user obtained after process, perform identical cryptographic storage operation, thus at secure operating system Inner Constitution for the fingerprint characteristic template base 115 of fingerprint recognition security service,
4.. the result after the success of fingerprint template safe storage is written on the memory headroom that Android fingerprint recognition program opens up, and the ident value of corresponding registers is set, perform specific instruction and be trapped in monitor environment;
5.. read flow process 4. in register identification value, determine that current MONITOR MODE is switched by security context, the context of Android before also being recovered by the context of coprocessor preservation secure operating system again, registering result returns to Android fingerprint recognition program the most at last, the success of prompting fingerprint register;
So far, the fingerprint register operation of fingerprint recognition all completes.Successfully erect fingerprint characteristic template base, in order to the matching operation of fingerprint recognition afterwards, fingerprint characteristic template base has been stored on the area of isolation of space with the form of ciphertext, and this will ensure the safety of user fingerprints information greatly.
Described fingerprint matching process, comprises step:
Step 201: the collection encryption of fingerprint image data.The same with registration process, general spatial region is run fingerprint recognition program, obtain simultaneously and be stored in key area of isolation being used in reference to print image data encryption, when clicking coupling button, trigger the fingerprint image data that fingerprint image acquisition device gathers user, and operation is encrypted to it;
Step 202: the safe transmission of fingerprint image data.Preserve the running status of current system, the fingerprint image data of the sensitivity of having encrypted is delivered to area of isolation, is switched to secure execution environments;
This step comprises following idiographic flow:
1. .Android fingerprint recognition program can apply for one piece of sufficient memory headroom, for depositing the ciphertext of the fingerprint image data that will pass to secure operating system, the request mark FP_MATCH of fingerprint recognition operation and depositing the fingerprint matching result of fingerprint recognition service safe process in secure operating system, the physical address of this section of memory headroom and request are identified stored in corresponding registers;
2.. perform SMC instruction, be trapped in monitor environment.Now monitor program can read the value of corresponding registers to judge whether the execution of this monitor program is because the security service of Android request call, if be verified, by the Service Request Identifiers FP_MATCH of insecure environments, stored in corresponding registers, for secure operating system access, the context and recovering that simultaneously coprocessor can preserve current Android be about to be switched to the context of security context;
Step 203: the characteristic matching of fingerprint characteristic model and fingerprint characteristic template.The fingerprint recognition service safe process that insulating space region is run, first by the fingerprint encrypt data of inner encryption/decryption module deciphering acquisition, call finger print data pretreatment module 113, fingerprint characteristic template library 115 and fingerprint minutiae matching module 116 afterwards successively, complete the matching operation of fingerprint, the result of fingerprint matching is returned to the fingerprint recognition program that normal areas is run;
This step comprises following idiographic flow:
1.. the fingerprint recognition service safe process of secure operating system utilizes its inner encryption/decryption module 112, is decrypted process by means of symmetric encipherment algorithm shared key to fingerprint encrypt data, to obtain the actual fingerprint image data information after removing head;
2.. finger print data pretreatment module 113, to pretreatment operation such as the fingerprint image data of reality successively smoothing noise reduction, picture field calculating, foreground segmentation, directional filtering, binaryzation, refinement, extraction eigenwerts, finally successfully obtains the fingerprint characteristic of user;
3. the file system of fingerprint recognition service safe process first carry secure operating system, the fingerprint characteristic storehouse cipher-text information of cryptographic storage in read step 103, RSA-2048 private key corresponding in encryption/decryption module can be utilized afterwards, rivest, shamir, adelman is used to be decrypted process to the fingerprint characteristic template base ciphertext read, the fingerprint characteristic registered before successfully obtaining user;
4.. using flow process 2. in the fingerprint characteristic that obtains as fingerprint characteristic model and flow process 3. in the fingerprint characteristic that obtains to carry out the matching operation of fingerprint characteristic successively as fingerprint characteristic template, finally obtain fingerprint similarity result;
5.. by flow process 4. in the fingerprint matching similarity result that obtains write back on the memory headroom that Android fingerprint recognition program opens up, and the ident value of corresponding registers is set, performs specific instruction and be switched to monitor environment;
6.. read flow process 5. in ident value in corresponding register, determine that current monitor environment is switched by security context, then preserve the context of secure operating system and the context of Android before recovery by coprocessor;
7. the result returned after .Android fingerprint recognition program acquisition secure operating system fingerprint recognition service processing, makes comparisons itself and the fingerprint similarity threshold preset, and is greater than this threshold value and then represents fingerprint matching success; Otherwise, fingerprint matching failure.
By means of this Secure isolation region, by to fingerprint image data encrypted transmission to secure operating system, and fingerprint recognition operations all to the pre-service, coupling etc. of this fingerprint image data afterwards all completes in this Secure isolation region, make itself and Android application program completely isolated, obviate potential Android malicious application and rob the possibility obtaining user fingerprint image data, ensure that the safety of fingerprint recognition overall process.
Be only specific embodiment of the invention case above, the security in the recognition methods of intelligent terminal employing fingerprint can be ensured by this invention, ensure that from fingerprint and get the overall process of fingerprint matching to the protection of the finger print data of sensitivity.
Claims (3)
1. a security fingerprint recognition methods for intelligent terminal, is characterized in that, comprise the following steps:
1) fingerprint register:
1-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint data of the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, normal operating system is switched to secure operating system; Described secure operating system is the operating system run in the Secure isolation region of intelligent terminal embedded hardware;
1-2) key being used for cryptographic fingerprint data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By monitoring module, secure operating system is switched to normal operating system;
1-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract the fingerprint characteristic of fingerprint characteristic as registered user after the fingerprint identification module decrypt fingerprint view data of 1-4) secure operating system, then store after internal cryptographic is carried out to the fingerprint characteristic of registered user; By monitoring module, secure operating system is switched to normal operating system;
2) fingerprint authentication:
2-1) fingerprint identification module of normal operating system is to the key of the request transmission fingerprint data of the fingerprint identification module of secure operating system; By monitoring module, normal operating system is switched to secure operating system;
2-2) key being used for cryptographic fingerprint data is sent to the fingerprint identification module of normal operating system by the fingerprint identification module of secure operating system; By the monitoring module of secure operating system, secure operating system is switched to normal operating system;
2-3) fingerprint identification module of normal operating system triggers fingerprint image acquisition device and gathers the fingerprint identification module being sent to secure operating system after fingerprint image data also uses the double secret key fingerprint image data of the transmission fingerprint data received to encrypt; By monitoring module, normal operating system is switched to secure operating system;
Extract fingerprint characteristic after the fingerprint identification module decrypt fingerprint view data of 2-4) secure operating system, then the fingerprint characteristic of inner deciphering registered user mates, and obtains fingerprint similarity result; By monitoring module, secure operating system is switched to normal operating system;
2-5) fingerprint identification module of normal operating system obtains similarity result and threshold value multilevel iudge whether the match is successful, and when similarity result is greater than threshold value, then the match is successful, otherwise it fails to match.
2. the security fingerprint recognition methods of a kind of intelligent terminal as claimed in claim 1, it is characterized in that, be symmetric cryptography to the encryption method of finger print data, is asymmetric encryption to the encryption method of fingerprint characteristic.
3. the security fingerprint recognition methods of a kind of intelligent terminal as claimed in claim 1, is characterized in that,
After fingerprint image acquisition device gathers fingerprint image data, the header information removed in fingerprint image data uses the key of transmission fingerprint view data to be encrypted to fingerprint image data again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510179446.XA CN104778393A (en) | 2015-04-16 | 2015-04-16 | Security fingerprint identification method for intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510179446.XA CN104778393A (en) | 2015-04-16 | 2015-04-16 | Security fingerprint identification method for intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104778393A true CN104778393A (en) | 2015-07-15 |
Family
ID=53619851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510179446.XA Pending CN104778393A (en) | 2015-04-16 | 2015-04-16 | Security fingerprint identification method for intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104778393A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105356998A (en) * | 2015-09-28 | 2016-02-24 | 宇龙计算机通信科技(深圳)有限公司 | TrustZone-based domain space switching system and method |
CN105653924A (en) * | 2015-12-30 | 2016-06-08 | 魅族科技(中国)有限公司 | Touch screen operation method and device |
CN105897417A (en) * | 2016-04-01 | 2016-08-24 | 广东欧珀移动通信有限公司 | Encrypted data input method and encrypted data input device |
CN105956540A (en) * | 2016-04-27 | 2016-09-21 | 乐视控股(北京)有限公司 | Method, device and electronic device for controlling a fingerprint sensor |
WO2017028277A1 (en) * | 2015-08-19 | 2017-02-23 | 华为技术有限公司 | Fingerprint recognition method and mobile terminal |
CN106548122A (en) * | 2015-09-17 | 2017-03-29 | 映智科技股份有限公司 | Fingerprint sensing integrated circuit and scrambling encryption method thereof |
WO2017067284A1 (en) * | 2015-10-19 | 2017-04-27 | 广东欧珀移动通信有限公司 | Fingerprint information secure call method, apparatus, and mobile terminal |
CN106886699A (en) * | 2017-01-20 | 2017-06-23 | 北京奇虎科技有限公司 | A kind of fingerprint authentication method and relevant device |
CN106897596A (en) * | 2017-01-20 | 2017-06-27 | 北京奇虎科技有限公司 | A kind of fingerprint authentication method and relevant device |
CN107403152A (en) * | 2017-07-19 | 2017-11-28 | 大唐终端技术有限公司 | High-pass platform TrustZone fingerprint recognition realization method and systems |
CN108292335A (en) * | 2015-12-24 | 2018-07-17 | 维普公司 | Biometric device |
CN108322307A (en) * | 2017-01-16 | 2018-07-24 | 中标软件有限公司 | Communication system and method between container based on kernel memory sharing |
CN108319835A (en) * | 2018-01-31 | 2018-07-24 | 北京小米移动软件有限公司 | User's space access control method, device, equipment and storage medium |
CN109753206A (en) * | 2017-11-02 | 2019-05-14 | 成都鼎桥通信技术有限公司 | The system switching method and device of electronic equipment |
CN109766681A (en) * | 2019-01-11 | 2019-05-17 | 苏州国芯科技有限公司 | User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing |
CN111314475A (en) * | 2020-02-21 | 2020-06-19 | 北京紫光展锐通信技术有限公司 | Session creation method and related equipment |
CN111414859A (en) * | 2020-03-20 | 2020-07-14 | 山东大学 | TrustZone-based retina identification method |
CN113312607A (en) * | 2021-08-02 | 2021-08-27 | 飞天诚信科技股份有限公司 | Method and system for realizing fingerprint sharing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1822013A (en) * | 2006-03-14 | 2006-08-23 | 上海一维科技有限公司 | Finger print biological identifying engine system and its identifying method based on credible platform module |
WO2008138653A1 (en) * | 2007-05-09 | 2008-11-20 | International Business Machines Corporation | A method and data processing system to prevent manipulation of computer systems |
CN102542444A (en) * | 2011-12-22 | 2012-07-04 | 大唐微电子技术有限公司 | Method, device and system for carrying out identity verification of mobile payment |
-
2015
- 2015-04-16 CN CN201510179446.XA patent/CN104778393A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1822013A (en) * | 2006-03-14 | 2006-08-23 | 上海一维科技有限公司 | Finger print biological identifying engine system and its identifying method based on credible platform module |
WO2008138653A1 (en) * | 2007-05-09 | 2008-11-20 | International Business Machines Corporation | A method and data processing system to prevent manipulation of computer systems |
CN102542444A (en) * | 2011-12-22 | 2012-07-04 | 大唐微电子技术有限公司 | Method, device and system for carrying out identity verification of mobile payment |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10409972B2 (en) | 2015-08-19 | 2019-09-10 | Huawei Technologies Co., Ltd. | Fingerprint recognition method and mobile terminal |
WO2017028277A1 (en) * | 2015-08-19 | 2017-02-23 | 华为技术有限公司 | Fingerprint recognition method and mobile terminal |
CN106548122B (en) * | 2015-09-17 | 2019-06-07 | 映智科技股份有限公司 | Fingerprint sensing integrated circuit and scrambling encryption method thereof |
CN106548122A (en) * | 2015-09-17 | 2017-03-29 | 映智科技股份有限公司 | Fingerprint sensing integrated circuit and scrambling encryption method thereof |
WO2017054294A1 (en) * | 2015-09-28 | 2017-04-06 | 宇龙计算机通信科技(深圳)有限公司 | Trustzone-based domain space switching system and method |
CN105356998A (en) * | 2015-09-28 | 2016-02-24 | 宇龙计算机通信科技(深圳)有限公司 | TrustZone-based domain space switching system and method |
US10713381B2 (en) | 2015-10-19 | 2020-07-14 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and apparatus for securely calling fingerprint information, and mobile terminal |
WO2017067284A1 (en) * | 2015-10-19 | 2017-04-27 | 广东欧珀移动通信有限公司 | Fingerprint information secure call method, apparatus, and mobile terminal |
CN108292335A (en) * | 2015-12-24 | 2018-07-17 | 维普公司 | Biometric device |
CN108292335B (en) * | 2015-12-24 | 2021-11-30 | 维普公司 | Biometric device |
CN105653924A (en) * | 2015-12-30 | 2016-06-08 | 魅族科技(中国)有限公司 | Touch screen operation method and device |
CN105897417A (en) * | 2016-04-01 | 2016-08-24 | 广东欧珀移动通信有限公司 | Encrypted data input method and encrypted data input device |
CN105956540A (en) * | 2016-04-27 | 2016-09-21 | 乐视控股(北京)有限公司 | Method, device and electronic device for controlling a fingerprint sensor |
WO2017185672A1 (en) * | 2016-04-27 | 2017-11-02 | 乐视控股(北京)有限公司 | Method and device for controlling fingerprint sensor, and electronic device |
CN108322307A (en) * | 2017-01-16 | 2018-07-24 | 中标软件有限公司 | Communication system and method between container based on kernel memory sharing |
CN108322307B (en) * | 2017-01-16 | 2021-02-09 | 中标软件有限公司 | Inter-container communication system and method based on kernel memory sharing |
CN106886699A (en) * | 2017-01-20 | 2017-06-23 | 北京奇虎科技有限公司 | A kind of fingerprint authentication method and relevant device |
CN106897596A (en) * | 2017-01-20 | 2017-06-27 | 北京奇虎科技有限公司 | A kind of fingerprint authentication method and relevant device |
CN107403152A (en) * | 2017-07-19 | 2017-11-28 | 大唐终端技术有限公司 | High-pass platform TrustZone fingerprint recognition realization method and systems |
CN107403152B (en) * | 2017-07-19 | 2020-07-31 | 大唐终端技术有限公司 | High-pass platform TrustZone fingerprint identification implementation method and system |
CN109753206A (en) * | 2017-11-02 | 2019-05-14 | 成都鼎桥通信技术有限公司 | The system switching method and device of electronic equipment |
CN108319835B (en) * | 2018-01-31 | 2020-09-11 | 北京小米移动软件有限公司 | User space access control method, device, equipment and storage medium |
CN108319835A (en) * | 2018-01-31 | 2018-07-24 | 北京小米移动软件有限公司 | User's space access control method, device, equipment and storage medium |
CN109766681A (en) * | 2019-01-11 | 2019-05-17 | 苏州国芯科技有限公司 | User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing |
CN111314475B (en) * | 2020-02-21 | 2021-05-04 | 北京紫光展锐通信技术有限公司 | Session creation method and related equipment |
CN111314475A (en) * | 2020-02-21 | 2020-06-19 | 北京紫光展锐通信技术有限公司 | Session creation method and related equipment |
CN111414859A (en) * | 2020-03-20 | 2020-07-14 | 山东大学 | TrustZone-based retina identification method |
CN113312607A (en) * | 2021-08-02 | 2021-08-27 | 飞天诚信科技股份有限公司 | Method and system for realizing fingerprint sharing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104778393A (en) | Security fingerprint identification method for intelligent terminal | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
CN105429761B (en) | A kind of key generation method and device | |
WO2017000342A1 (en) | Fingerprint recognition method and terminal | |
US9218473B2 (en) | Creation and authentication of biometric information | |
WO2016110101A1 (en) | Fingerprint authentication method and device, intelligent terminal, and computer storage medium | |
CN101958892B (en) | Electronic data protection method, device and system based on face recognition | |
CN105069442B (en) | A kind of finger print safety cell S E mould group and payment verification method | |
WO2021004519A1 (en) | Data security processing terminal, system and method | |
CN103646201A (en) | Verification method achieved by combining human faces with identities | |
CN101470783A (en) | Identity recognition method and device based on trusted platform module | |
US10963552B2 (en) | Method and electronic device for authenticating a user | |
CN105281907B (en) | Encrypted data processing method and device | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
JP2023139259A (en) | Image collection apparatus, server, encryption method, and decryption method | |
WO2017215533A1 (en) | Biological characteristic recognition device and method and biological characteristic template registration method | |
CN106936775A (en) | A kind of authentication method and system based on fingerprint recognition | |
CN103269481A (en) | Method and system for encrypting and protecting procedure or file of portable electronic equipment | |
CN105913252A (en) | Fingerprint encrypted EID financial card and realization method | |
US9710633B2 (en) | Method and apparatus for authenticating user | |
US20230222843A1 (en) | Method and device for registering biometric feature | |
CN105678137A (en) | Method and device for identity recognition | |
CN205354036U (en) | Data encryption cloud storage system based on multimode biological identification technique | |
CN107104968A (en) | Safety certifying method, system, terminal and the storage medium of portable finance device | |
CN105512541A (en) | Screen unlocking method, data encryption and decryption methods as well as related devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150715 |