CN105827625A - Authentication method and authentication system, electronic device based on biological identification information - Google Patents

Authentication method and authentication system, electronic device based on biological identification information Download PDF

Info

Publication number
CN105827625A
CN105827625A CN201610270996.7A CN201610270996A CN105827625A CN 105827625 A CN105827625 A CN 105827625A CN 201610270996 A CN201610270996 A CN 201610270996A CN 105827625 A CN105827625 A CN 105827625A
Authority
CN
China
Prior art keywords
password
biometric information
security context
request
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610270996.7A
Other languages
Chinese (zh)
Inventor
马玉明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610270996.7A priority Critical patent/CN105827625A/en
Publication of CN105827625A publication Critical patent/CN105827625A/en
Priority to PCT/CN2016/102960 priority patent/WO2017185683A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an authentication method and an authentication system, an electronic device based on biological identification information. The authentication method includes the following steps: 1. detecting whether a request involving a cipher is received from other applications; if the request is received, the alerting a user to input biological identification information; 2. detecting the biological identification information input by a user under safe environment, conducing security authentication on the biological identification information; if the security authentication is passed, then in accordance with the request, checking the cipher involved in the request under safe environment, and transmitting the cipher involved in the request to relevant applications. According to the invention, the method and system can increase safety of user's information.

Description

Authentication method based on biometric information and Verification System, electronic equipment
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of authentication method based on biometric information, a kind of Verification System based on biometric information and a kind of electronic equipment.
Background technology
In prior art, it is usually mounted with multiple application (Application) on intelligent terminal's (such as mobile phone, intelligent television, PDA etc.), user is needed to input username and password when logging in these application, during using application after login, it is likely to there will be sensitive operation (such as pay, transfer accounts, change password etc.) and relates to password, therefore user needs to remember one by one the information such as password that these are applied and inputs these information, the most not very convenient, poor user experience.
Summary of the invention
It is an object of the invention to provide a kind of new certificate scheme based on biometric information, help user to be managed collectively the encrypted message of multiple application.
According to the first aspect of the invention, it is provided that a kind of authentication method based on biometric information, comprise the following steps: step 1, detect whether to receive and apply, from other, the request relating to password sent;Apply, from other, the request relating to password sent if received, then prompting user needs to input biometric information;Step 2, the biometric information that detection user inputs in security context, carry out safety certification to described biometric information;If safety certification is passed through, then in described security context, search, according to described request, the password that described request relates to, and the password that described request relates to is sent to related application.
Preferably, described method also includes: be stored in described security context after the password encryption of other application described;In described step 2, after finding the password that described request relates to, first in security context, it is decrypted with private key, the most again the password decrypted is sent to related application.
Preferably, in described step 1, described request further relates to user name;In described step 2, if safety certification is passed through, then the username and password that described request relates to is sent jointly to related application.
Preferably, the described biometric information detecting user's input in security context, described biometric information is carried out safety certification, including: from the biometric information that described user inputs, extract biological characteristic value, then the biological characteristic value extracted and the biological characteristic value being stored in security context being compared, if both coincide, safety certification is passed through.
Preferably, described biometric information is following arbitrary or combination: fingerprint, iris, sound.
According to the second aspect of the invention, it is provided that a kind of Verification System based on biometric information, including request receiver module and security authentication module;Described request receiver module, applies, from other, the request relating to password sent for detecting whether receive;Apply, from other, the request relating to password sent if received, then prompting user needs to input biometric information;Described security authentication module, for detecting the biometric information of user's input in security context, carries out safety certification to described biometric information;If safety certification is passed through, then in described security context, search, according to described request, the password that described request relates to, and the password that described request relates to is sent to related application.
Preferably, it is stored in described security context after the password encryption of other application described;Described security authentication module, for after finding the password that described request relates to, is first decrypted it in security context with private key, the most again the password decrypted is sent to related application.
Preferably, described security authentication module detects the biometric information of user's input in security context, described biometric information is carried out safety certification, including: from the biometric information that described user inputs, extract biological characteristic value, then the biological characteristic value extracted and the biological characteristic value being stored in security context being compared, if both coincide, safety certification is passed through.
Preferably, described biometric information is following arbitrary or combination: fingerprint, iris, sound.
According to the third aspect of the invention we, it is provided that a kind of electronic equipment, having processor and memorizer, wherein, described memorizer is used for storing instruction, and described instruction is used for controlling described processor and carries out operating to perform method as described before.
The authentication method based on biometric information of the present invention and system, the password of other application multiple can be managed collectively, when when certain, other application needs to input password, can jump to point out user to input biometric information, in security context, the biometric information of user's input is carried out safety certification, if certification by; password is sent to related application, the most more has associative perception, Consumer's Experience is more preferable.
By detailed description to the exemplary embodiment of the present invention referring to the drawings, the further feature of the present invention and advantage thereof will be made apparent from.
Accompanying drawing explanation
Combined in the description and the accompanying drawing of the part that constitutes description shows embodiments of the invention, and together with its explanation for explaining the principle of the present invention.
Fig. 1 shows the flow chart of the authentication method based on biometric information that first embodiment of the invention provides.
Fig. 2 shows the flow chart of the authentication method based on biometric information that second embodiment of the invention provides.
Fig. 3 shows the flow chart of the authentication method based on biometric information that third embodiment of the invention provides.
Fig. 4 shows the block diagram of the Verification System based on biometric information that the embodiment of the present invention provides.
Fig. 5 shows the block diagram of the electronic equipment that the embodiment of the present invention provides.
Fig. 6 shows the block diagram of the hardware configuration of the electronic equipment that the embodiment of the present invention provides.
Detailed description of the invention
The various exemplary embodiments of the present invention are described in detail now with reference to accompanying drawing.It should also be noted that unless specifically stated otherwise, the parts illustrated the most in these embodiments and positioned opposite, the numerical expression of step and numerical value do not limit the scope of the invention.
Description only actually at least one exemplary embodiment is illustrative below, never as to the present invention and application thereof or any restriction of use.
May be not discussed in detail for technology, method and apparatus known to person of ordinary skill in the relevant, but in the appropriate case, described technology, method and apparatus should be considered a part for description.
In shown here and all examples of discussing, any occurrence should be construed as merely exemplary rather than as limiting.Therefore, other example of exemplary embodiment can have different values.
It should also be noted that similar label and letter represent similar terms in following accompanying drawing, therefore, the most a certain Xiang Yi accompanying drawing is defined, then need not it is further discussed in accompanying drawing subsequently.
Biometric information in the present invention, refers to the personalized physiological feature of the mankind, such as fingerprint, iris, sound etc., and these physiological features are personalized, and these biometric information therefore can be utilized to identify user.
< embodiment one >
With reference to shown in Fig. 1, first embodiment provides a kind of authentication method based on biometric information, the method such as can pass through to arrange a safety box on intelligent terminal should be for implementing, communicated by other application on safety box application and intelligent terminal, it is achieved utilize the technique effect of the password of safety box application other application of unified management.In the present invention, the type of other application is the most wide in range, can be any application relating to password, explains with a shopping application in first embodiment.
101, detect whether to receive and apply, from other, the request relating to password sent.
If user needs user to input password during using this shopping application, then this shopping application can send the request relating to password to safety box application, the ID that at least should apply with this shopping in described request, if this shopping application has multiple-enciphered, such as there is password for inquiry and payment cipher, so also should be with the numbering of password in this request, in order to safety box application knows this shopping application is to ask which password.
If 102 receive the request relating to password sent from other application, then prompting user needs to input biometric information.
If safety box application receives this shopping and applies the request relating to password sent, then safety box application can point out user to input biometric information by ejecting the mode such as a text window or report voice, the biometric information for example, fingerprint used in first embodiment.
103, in security context, detect the biometric information of user's input, described biometric information is carried out safety certification.
After user inputs fingerprint, the fingerprint detecting input in security context applied by safety box, and fingerprint carries out safety certification, namely judges that whether the fingerprint of input is the fingerprint of user.The step for can be e.g.: from input fingerprint extract fingerprint characteristic value (fingerprint characteristic value can such as include end points, bifurcation, isolated point, circling point, short grain, direction, curvature etc.), then the fingerprint characteristic value extracted and the fingerprint characteristic value being pre-stored within security context are compared, if both coincide, safety certification is passed through, and namely judges that the fingerprint inputted is exactly the fingerprint of user.
If 104 safety certifications are passed through, then in described security context, search, according to described request, the password that described request relates to.
That is, if it is determined that the fingerprint of input is exactly the fingerprint of user, then obtain, according to the numbering inquiry of the password that this request of the information searching comprised in described request is corresponding, the such as ID applied according to this shopping and password, the payment cipher that this shopping application is corresponding.
105, the password that described request relates to is sent back to related application, password namely returns to send the application of described request.
After this shopping application receives password, can be the same with in prior art, remove the background server checking password that this shopping is applied voluntarily, carry out subsequent operation.
The security context mentioned in the present invention can be such as credible execution environment (Trustedexecutionenvironment, TEE), step 103 and 104 can be performed by the trusted application (TrustedApplication, TA) run in described credible execution environment.The credible execution environment of intelligent terminal can be that the operating system with intelligent terminal is physically isolated, mutual by credible execution environment client application programming interface (TEEClientAPI) between credible execution environment and operating system.Security context can have the hardware resource of self, including CPU, internal memory, safety storage (SecureStorage), secure clock (SecureTime) etc., utilize security context can be further ensured that the safety of password, and ensure the anti-tamper and anti-intrusion in safety certification process.
The authentication method based on biometric information of the present invention, the password of other application multiple can be managed collectively, when when certain, other application needs to input password, can jump to point out user to input biometric information, in security context, the biometric information of user's input is carried out safety certification, if certification by; password is sent to related application, the most more there is associative perception, the most either which application, how long password is, all having only to one fingerprint of user's typing, Consumer's Experience is more preferable.Alternatively, owing to password is stored in security context, and only using biometric information can obtain password, certification biometric information also obtains the process of password and also runs in security context, therefore, it is possible to improve the safety of user profile.
< embodiment two >
With reference to shown in Fig. 2, the second embodiment provides a kind of authentication method based on biometric information, comprises the following steps:
201, detect whether to receive and apply, from other, the request relating to password sent.
If 202 receive the request relating to password sent from other application, then prompting user needs to input biometric information.
203, in security context, detect the biometric information of user's input, described biometric information is carried out safety certification.
If 204 safety certifications are passed through, then in described security context, search, according to described request, the password that described request relates to.
205, password is decrypted in security context with private key.
206, the password decrypted is sent to related application.
Wherein, step 201-204 is similar with abovementioned steps 101-104, and explanation is not repeated herein.Differring primarily in that of second embodiment and first embodiment, the password of other application is stored in security context in an encrypted form, safety box application is searched after obtaining the password that described request relates to, need first password to be decoded in security context with the private key of safety box, then the password that deciphering obtains being sent back to related application, the method for the second embodiment can be further ensured that the safety of password.
< embodiment three >
With reference to shown in Fig. 3, the 3rd embodiment provides a kind of authentication method based on biometric information, comprises the following steps:
301, detect whether to receive and apply, from other, the request relating to username and password sent.
If 302 receive the request relating to username and password sent from other application, then prompting user needs to input biometric information.
303, in security context, detect the biometric information of user's input, described biometric information is carried out safety certification.
If 304 safety certifications are passed through, then in described security context, search, according to described request, the username and password that described request relates to.
305, the username and password that described request relates to is sent to related application.
Wherein, step 301-305 is similar with abovementioned steps 101-105, differring primarily in that of 3rd embodiment and first embodiment, this shopping application is simultaneously to safety box application request username and password, username and password is returned to this shopping application by safety box application together, and the 3rd embodiment is applicable to user more and logs in the situation of this shopping application, it is not necessary to user is manually entered username and password, have only to user's typing fingerprint, be more convenient for the use of user.
< embodiment four >
With reference to shown in Fig. 4, the 4th embodiment provides a kind of Verification System based on biometric information 10, and Verification System 10 includes asking receiver module 11 and security authentication module 12.The know-why of Verification System 10, implementation process, technique effect and first~the 3rd embodiment are similar to.
Request receiver module 11, applies, from other, the request relating to password sent for detecting whether receive;Apply, from other, the request relating to password sent if received, then prompting user needs to input biometric information.
Security authentication module 12, for detecting the biometric information of user's input in security context, carries out safety certification to described biometric information;If safety certification is passed through, then in described security context, search, according to described request, the password that described request relates to, and the password that described request relates to is sent to related application.
Alternatively, it is stored in described security context after the password encryption of other application described;Security authentication module 12, for after finding the password that described request relates to, is first decrypted it in security context with private key, the most again the password decrypted is sent to related application.
Alternatively, security authentication module 12 detects the biometric information of user's input in security context, described biometric information is carried out safety certification, including: from the biometric information that described user inputs, extract biological characteristic value, then the biological characteristic value extracted and the biological characteristic value being stored in security context being compared, if both coincide, safety certification is passed through.
The Verification System based on biometric information of the present invention, the password of other application multiple can be managed collectively, when when certain, other application needs to input password, can jump to point out user to input biometric information, in security context, the biometric information of user's input is carried out safety certification, if certification by; password is sent to related application, the most more there is associative perception, the most either which application, how long password is, all having only to one fingerprint of user's typing, Consumer's Experience is more preferable.Alternatively, owing to password is stored in security context, and only using biometric information can obtain password, certification biometric information also obtains the process of password and also runs in security context, therefore, it is possible to improve the safety of user profile.
With reference to shown in Fig. 5, the embodiment of the present invention additionally provides a kind of electronic equipment 20, including memorizer 21 and processor 22, wherein, described memorizer 21 is used for storing instruction, and described instruction carries out operating performing aforementioned first~the 3rd method of embodiment for controlling described processor 22.Concrete know-why, implementation process and the technique effect of electronic equipment 20 see above, and explanation is not repeated herein.
With reference to shown in Fig. 6, show and can be used for realizing the block diagram of the example of the hardware configuration of the electronic equipment 30 of embodiments of the invention:
Electronic equipment 30 includes memorizer 3020 and processor 3010, and wherein, described memorizer 3020 is used for storing instruction, and described instruction carries out corresponding operating to realize the authentication method of the present invention for controlling processor 3010.
Electronic equipment 30 also includes interface arrangement 3030, communicator 3040, display device 3050, input equipment 3060, speaker 3070, mike 3080, etc..
Processor 3010 can be such as central processor CPU, Micro-processor MCV etc..Memorizer 3020 such as includes ROM (read only memory), RAM (random access memory), the nonvolatile memory etc. of such as hard disk.Interface arrangement 3030 such as includes USB interface, earphone interface etc..Communicator 3040 such as can carry out wired or wireless communication.Display device 3050 e.g. LCDs, touch display screen etc..Input equipment 3060 such as can include touch screen, keyboard etc..User can pass through speaker 3070 and mike 3080 inputting/outputting voice information.
Electronic equipment shown in Fig. 6 is only explanatory, and is never intended to limit invention, its application, or uses.Although it will be appreciated by those skilled in the art that and figure 6 illustrates multiple device, but, the present invention can only relate to partial devices therein.Those skilled in the art can instruct according to presently disclosed conceptual design, and instruction how to control processor to carry out operation being techniques well known, therefore is not described in detail at this.
Various aspects of the invention are described referring herein to method according to embodiments of the present invention, device (system) and the flow chart of electronic equipment and/or block diagram.Should be appreciated that the combination of each square frame in flow chart and/or each square frame of block diagram and flow chart and/or block diagram, can be realized by readable program instructions.
Flow chart in accompanying drawing and block diagram show architectural framework in the cards, function and the operation of the system of multiple embodiments according to the present invention, methods and procedures product.In this, each square frame in flow chart or block diagram can represent a module, program segment or a part for instruction, and a part for described module, program segment or instruction comprises the executable instruction of one or more logic function for realizing regulation.It is well known that to those skilled in the art, realize being all of equal value by the way of hardware mode is realized, realized by software mode and combined by software and hardware.
Being described above various embodiments of the present invention, described above is exemplary, and non-exclusive, and it is also not necessarily limited to disclosed each embodiment.In the case of the scope and spirit without departing from illustrated each embodiment, many modifications and changes will be apparent from for those skilled in the art.The selection of term used herein, it is intended to explain that the principle of each embodiment, reality are applied or to the technological improvement in market, or made other those of ordinary skill of the art be understood that each embodiment disclosed herein best.The scope of the present invention be defined by the appended claims.

Claims (10)

1. an authentication method based on biometric information, it is characterised in that comprise the following steps:
Step 1, detect whether to receive and apply, from other, the request relating to password sent;Apply, from other, the request relating to password sent if received, then prompting user needs to input biometric information;
Step 2, the biometric information that detection user inputs in security context, carry out safety certification to described biometric information;If safety certification is passed through, then in described security context, search, according to described request, the password that described request relates to, and the password that described request relates to is sent to related application.
Method the most according to claim 1, it is characterised in that described method also includes: be stored in described security context after the password encryption of other application described;In described step 2, after finding the password that described request relates to, first in security context, it is decrypted with private key, the most again the password decrypted is sent to related application.
Method the most according to claim 1, it is characterised in that in described step 1, further relates to user name in described request;In described step 2, if safety certification is passed through, then the username and password that described request relates to is sent jointly to related application.
4. according to the method described in any one of claim 1-3, it is characterized in that, the described biometric information detecting user's input in security context, described biometric information is carried out safety certification, including: from the biometric information that described user inputs, extract biological characteristic value, then the biological characteristic value extracted and the biological characteristic value being stored in security context being compared, if both coincide, safety certification is passed through.
5. according to the method described in any one of claim 1-3, it is characterised in that described biometric information is following arbitrary or combination: fingerprint, iris, sound.
6. a Verification System based on biometric information, it is characterised in that include asking receiver module and security authentication module;
Described request receiver module, applies, from other, the request relating to password sent for detecting whether receive;Apply, from other, the request relating to password sent if received, then prompting user needs to input biometric information;
Described security authentication module, for detecting the biometric information of user's input in security context, carries out safety certification to described biometric information;If safety certification is passed through, then in described security context, search, according to described request, the password that described request relates to, and the password that described request relates to is sent to related application.
System the most according to claim 6, it is characterised in that be stored in described security context after the password encryption of other application described;Described security authentication module, for after finding the password that described request relates to, is first decrypted it in security context with private key, the most again the password decrypted is sent to related application.
8. according to the system described in any one of claim 6 or 7, it is characterized in that, described security authentication module detects the biometric information of user's input in security context, described biometric information is carried out safety certification, including: from the biometric information that described user inputs, extract biological characteristic value, then the biological characteristic value extracted and the biological characteristic value being stored in security context being compared, if both coincide, safety certification is passed through.
9. according to the system described in any one of claim 6 or 7, it is characterised in that described biometric information is following arbitrary or combination: fingerprint, iris, sound.
10. an electronic equipment, it is characterised in that having processor and memorizer, wherein, described memorizer is used for storing instruction, described instruction carries out operating to perform according to the method described in any one of claim 1-5 for controlling described processor.
CN201610270996.7A 2016-04-27 2016-04-27 Authentication method and authentication system, electronic device based on biological identification information Pending CN105827625A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610270996.7A CN105827625A (en) 2016-04-27 2016-04-27 Authentication method and authentication system, electronic device based on biological identification information
PCT/CN2016/102960 WO2017185683A1 (en) 2016-04-27 2016-10-21 Authentication method and authentication system based on biological identification information, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610270996.7A CN105827625A (en) 2016-04-27 2016-04-27 Authentication method and authentication system, electronic device based on biological identification information

Publications (1)

Publication Number Publication Date
CN105827625A true CN105827625A (en) 2016-08-03

Family

ID=56528877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610270996.7A Pending CN105827625A (en) 2016-04-27 2016-04-27 Authentication method and authentication system, electronic device based on biological identification information

Country Status (2)

Country Link
CN (1) CN105827625A (en)
WO (1) WO2017185683A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017185683A1 (en) * 2016-04-27 2017-11-02 乐视控股(北京)有限公司 Authentication method and authentication system based on biological identification information, and electronic device
CN110235140A (en) * 2019-04-29 2019-09-13 深圳市汇顶科技股份有限公司 Biological feather recognition method and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111666560A (en) * 2020-05-28 2020-09-15 南开大学 Password management method and system based on trusted execution environment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080016371A1 (en) * 2006-07-14 2008-01-17 Arachnoid Biometrics Identification Group Corp. System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application
CN102281539A (en) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN104184701A (en) * 2013-05-21 2014-12-03 腾讯科技(深圳)有限公司 Third-party application log-in method, device and terminal
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device
CN104715181A (en) * 2013-12-17 2015-06-17 深圳富泰宏精密工业有限公司 Login system and method of application software
CN105207985A (en) * 2015-07-29 2015-12-30 广东欧珀移动通信有限公司 Application program login method and mobile terminal

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727550A (en) * 2008-10-27 2010-06-09 联想(北京)有限公司 Cipher safety system identified on basis of biological characteristics and method
CN104092550B (en) * 2014-07-23 2017-10-17 三星电子(中国)研发中心 Cipher code protection method, system and device
CN105069442B (en) * 2015-08-25 2018-12-07 杭州晟元数据安全技术股份有限公司 A kind of finger print safety cell S E mould group and payment verification method
CN204883745U (en) * 2015-08-25 2015-12-16 杭州晟元数据安全技术股份有限公司 Fingerprint safety unit SE module
CN105373924B (en) * 2015-10-10 2022-04-12 豪威科技(北京)股份有限公司 System for providing safe payment function for terminal equipment
CN105827625A (en) * 2016-04-27 2016-08-03 乐视控股(北京)有限公司 Authentication method and authentication system, electronic device based on biological identification information

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080016371A1 (en) * 2006-07-14 2008-01-17 Arachnoid Biometrics Identification Group Corp. System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application
CN102281539A (en) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN104184701A (en) * 2013-05-21 2014-12-03 腾讯科技(深圳)有限公司 Third-party application log-in method, device and terminal
CN104715181A (en) * 2013-12-17 2015-06-17 深圳富泰宏精密工业有限公司 Login system and method of application software
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device
CN105207985A (en) * 2015-07-29 2015-12-30 广东欧珀移动通信有限公司 Application program login method and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017185683A1 (en) * 2016-04-27 2017-11-02 乐视控股(北京)有限公司 Authentication method and authentication system based on biological identification information, and electronic device
CN110235140A (en) * 2019-04-29 2019-09-13 深圳市汇顶科技股份有限公司 Biological feather recognition method and electronic equipment

Also Published As

Publication number Publication date
WO2017185683A1 (en) 2017-11-02

Similar Documents

Publication Publication Date Title
US9529985B2 (en) Global authentication service using a global user identifier
US9628282B2 (en) Universal anonymous cross-site authentication
US9800574B2 (en) Method and apparatus for providing client-side score-based authentication
US20150281227A1 (en) System and method for two factor user authentication using a smartphone and nfc token and for the automatic generation as well as storing and inputting of logins for websites and web applications
US10200868B1 (en) Augmented reality security access
US20090077640A1 (en) System and method for validating user identification
US10063538B2 (en) System for secure login, and method and apparatus for same
US20180097794A1 (en) Timing array as credentials
EP3206329B1 (en) Security check method, device, terminal and server
EP3824592A1 (en) Public-private key pair protected password manager
JP2016518667A (en) User authentication
US9882719B2 (en) Methods and systems for multi-factor authentication
EP3937040B1 (en) Systems and methods for securing login access
US10437971B2 (en) Secure authentication of a user of a device during a session with a connected server
US20140101772A1 (en) Input method, input apparatus, and input program
TW201544983A (en) Data communication method and system, client terminal and server
CN105827625A (en) Authentication method and authentication system, electronic device based on biological identification information
JP6378424B1 (en) User authentication method with enhanced integrity and security
SE540649C2 (en) Method and system for secure password storage
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
US20220255759A1 (en) Verification push notifications through web-browser
KR20160100192A (en) System for digital authentication using pairing between universal RF tag and smart phone
KR20160037520A (en) System and method for federated authentication based on biometrics
CA2878269A1 (en) System and method for two factor user authentication using a smartphone and nfc token and for the automatic generation as well as storing and inputting of logins for websites and web applications
JP2015090650A (en) Terminal device, authentication method, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160803