CN104915584A - Intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics - Google Patents

Intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics Download PDF

Info

Publication number
CN104915584A
CN104915584A CN201510298775.6A CN201510298775A CN104915584A CN 104915584 A CN104915584 A CN 104915584A CN 201510298775 A CN201510298775 A CN 201510298775A CN 104915584 A CN104915584 A CN 104915584A
Authority
CN
China
Prior art keywords
fingerprint
password
mobile terminal
intelligent mobile
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510298775.6A
Other languages
Chinese (zh)
Other versions
CN104915584B (en
Inventor
谢恩
郑勇
张立新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Waterward Information Co Ltd
Original Assignee
SHENZHEN WATER WORLD TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN WATER WORLD TECHNOLOGY Co Ltd filed Critical SHENZHEN WATER WORLD TECHNOLOGY Co Ltd
Priority to CN201510298775.6A priority Critical patent/CN104915584B/en
Publication of CN104915584A publication Critical patent/CN104915584A/en
Application granted granted Critical
Publication of CN104915584B publication Critical patent/CN104915584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to an intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics. An initial code is utilized to perform symmetrical encryption on initial fingerprints so as to encrypted fingerprints; the initial code and the encrypted fingerprints are utilized to perform dual encryption on an intelligent mobile terminal. During decryption, the encrypted fingerprints can be decrypted to obtain decrypted fingerprints only if an input code is matched with the initial code, and further the decryption of the intelligent mobile terminal can be finished only if the decrypted fingerprints are matched with input fingerprints. Since the encrypted fingerprints are obtained by performing symmetrical encryption on the initial fingerprints by use of the initial code, and different encrypted fingerprints are obtained by inputting different initial codes, so that random encryption for the initial fingerprints can be realized; furthermore, since encryption and decryption are executed in a trust zone safe mode, unauthorized software can not acquire an encryption and decryption algorithm, even if the initial code and the encrypted fingerprints are obtained, correct decrypted fingerprints for realizing fingerprint matching can not be obtained, so that the safety of the intelligent mobile terminal is greatly enhanced.

Description

The random encrypting and deciphering system of intelligent mobile terminal based on fingerprint characteristic
Technical field
The present invention relates to encrypting fingerprint technical field, particularly relate to the random encrypting and deciphering system of a kind of intelligent mobile terminal based on fingerprint characteristic.
Background technology
Along with payment is to mobile terminal migration, security risk is also just constantly aggravated.Mobile phone is lost, Trojan software to be stolen etc. and all allowed the move medias such as mobile phone become mobile national treasury in the air.Namely fingerprint recognition refers to be differentiated by the details of more different fingerprint, due to fingerprint recognition have fast, convenient, safe, exclusive, the advantage such as can not to lose, the particularly inherent feature of user, fingerprint recognition will be allowed to condition at mobile terminal safety and mobile payment service aspect is widely used.But also there is security risk in fingerprint recognition, the restriction of mobile intelligent terminal size causes the contact area of fingerprint sensor little, the sampling of unique point is limited, algorithm based on fingerprint image coupling is by similarity Fuzzy comparisons, image matching algorithm is relied on large, so also can be cracked by some special means, the probability cracked is approximately 1/50000, brings hidden danger safely to mobile payment and information of mobile terminal.Traditional password is main flow in mobile payment now, convenient and practical, meets user habit, and the probability that 6 bit digital passwords are cracked is 1/1000000.Fingerprint recognition combined with password, using password as key, can realize the distinctive encryption of fingerprint characteristic, its probability cracked is 1/50000000000, greatly can increase the safety of mobile payment.
Summary of the invention
Technical matters to be solved by this invention is, provides a kind of intelligent mobile terminal based on fingerprint characteristic random encrypting and deciphering system, utilizes password to be combined with fingerprint and carries out encryption and decryption to intelligent mobile terminal.The present invention is achieved in that
The random encrypting and deciphering system of intelligent mobile terminal based on fingerprint characteristic, comprising:
Fingerprint identification module, for gathering the initial fingerprint of user's input;
Password Input module, for receiving the initial password of described user input;
Base-Band Processing and intelligent use processing module, it supports trust zone framework, for receiving described initial fingerprint and described initial password, and utilize described initial password to carry out symmetric encryption operation to described initial fingerprint under trust zone safe mode, obtain cryptographic fingerprint, and this cryptographic fingerprint is stored into together with described initial password its trust zone region, realize the encryption to described intelligent mobile terminal;
When to described intelligent mobile terminal deciphering:
Described fingerprint identification module is also for Gather and input fingerprint;
Described Password Input module is also for receiving input password;
Described Base-Band Processing and intelligent use processing module are also for comparing the initial password stored in described input password and trust zone region, and utilize cryptographic fingerprint described in described input codon pair to carry out symmetrical decrypt operation when comparison is consistent, obtain decrypt fingerprint, and by this decrypt fingerprint and described input fingerprint matching, and when the match is successful, described intelligent mobile terminal is unlocked.
Further, described Base-Band Processing and intelligent use processing module also have Modify password pattern; In Modify password pattern:
Described Password Input module is also for receiving the Old Password of described user input;
Described Base-Band Processing and intelligent use processing module are also for receiving described Old Password, and the initial password stored in described Old Password and trust zone region is compared, and utilize described Old Password to carry out symmetrical decrypt operation to described cryptographic fingerprint when comparison is consistent, obtain decrypt fingerprint, simultaneously, the new password of described user input is received by described Password Input module, and utilize this new password to re-start symmetric cryptography to this decrypt fingerprint, obtain new cryptographic fingerprint, and this new cryptographic fingerprint is stored into trust zone region together with this new password.
Further, described symmetric encryption operation is that XOR/invertible matrix is multiplied/ring shift or DES symmetric encipherment algorithm.
Further, described fingerprint identification module is capacitive fingerprint sensing device.
Further, described Password Input module is touch display screen.
Further, described Base-Band Processing and intelligent use processing module are connected with radio-frequency module; This radio-frequency module is connected with antenna.
Further, described Base-Band Processing and intelligent use processing module are connected with memory module.
Further, described Base-Band Processing and intelligent use processing module are connected with audio-frequency module; Described audio-frequency module is connected with microphone and loudspeaker, for driving described microphone and loudspeaker.
Further, described Base-Band Processing and intelligent use processing module are connected with camera.
Further, the kernel of described Base-Band Processing and intelligent use processing module is ARM Cortex A53 tetra-core 64 bit processor.
Compared with prior art, the present invention utilizes initial password to carry out symmetric cryptography to initial fingerprint and obtains cryptographic fingerprint, and utilizes initial password and cryptographic fingerprint to carry out double-encryption to intelligent mobile terminal.During deciphering, password need be inputted and mate with initial password to be decrypted cryptographic fingerprint and draw decrypt fingerprint, also need decrypt fingerprint just can complete the deciphering to intelligent mobile terminal with input fingerprint matching simultaneously.Meanwhile, because cryptographic fingerprint utilizes initial password to carry out symmetric cryptography to initial fingerprint to obtain, input different initial passwords and can obtain different cryptographic fingerprint, the accidental enciphering to initial fingerprint can be realized.Moreover, because encryption and decryption all performs under trust zone safe mode, non-authorised software cannot obtain enciphering and deciphering algorithm, even if obtain initial password and cryptographic fingerprint, also cannot show that correct decrypt fingerprint is to realize fingerprint matching, significantly improves the security of intelligent mobile terminal.
Accompanying drawing explanation
Fig. 1: the intelligent mobile terminal based on fingerprint characteristic that the embodiment of the present invention provides random encrypting and deciphering system composition schematic diagram.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.
As shown in Figure 1, the random encrypting and deciphering system of the intelligent mobile terminal based on fingerprint characteristic that the embodiment of the present invention provides comprises fingerprint identification module 2, Password Input module 3 and Base-Band Processing and intelligent use processing module 1.
Fingerprint identification module 2 is for gathering the initial fingerprint of user's input.Fingerprint identification module 2 is made up of chip, sapphire, becket, soft board, support plate etc., adopts SPI high speed bus interface to be connected with between Base-Band Processing and intelligent use processing module 1.Fingerprint identification module 2 adopts capacitive fingerprint sensing device, can adopt the fingerprint sensor of scratching formula or push type.When finger finger tip scratching or pressing sense the capacitive fingerprint sensing device of fingerprint, this capacitive fingerprint sensing device just can produce capacitance signal change to provide fingerprint image according to the fingerprint ridge of fingerprint and fingerprint paddy.The fingerprint image obtained is the gray level image that a width contains more noise, by intelligent use processor, pre-service is carried out to improve the quality of fingerprint image to this fingerprint image, strengthen the contrast of fingerprint ridge and fingerprint paddy, fingerprint image is become width point and line chart clearly, so that carry out feature extraction.
Base-Band Processing and intelligent use processing module 1 support trust zone framework.TrustZone is the safety technique for mobile intelligent terminal of ARM company exploitation, TrustZone technology and Cortex tM-A processor is closely integrated, and passes through aXI bus and specific TrustZone system IP block are expanded in systems in which.This system can protect the peripheral hardwares such as secure memory, cryptographic block, keyboard and screen, thus can guarantee that they exempt from software attacks.Develop according to TrustZone Ready Program suggestion and utilize the equipment of TrustZone technology to provide can to support the platform of complete credible execution environment (TEE), safe aware application and security service, triplicity can be got up by high-performance arm processor platform.Endorse employing ARM Cortex A series polycaryon processor in Base-Band Processing and intelligent use processing module 1, this series processors supports TrustZone technology.As ARM Cortex A53 tetra-core 64 bit processor, there is the processing speed of 1.5GHz, can be used for the encryption and decryption computing etc. of Finger print characteristic abstract, password coupling, intelligent mobile terminal.The Finger print characteristic abstract time <20ms of this processor, fingerprint matching <200ms operation time, can meet and pay real-time demand.Base-Band Processing and intelligent use processing module 1 have general mode and Trust Zone safe mode, can switch between two kinds of patterns.The fingerprint image that Base-Band Processing and intelligent use processing module 1 can collect fingerprint identification module 2 under trust zone safe mode carries out pre-service to improve the security in processing procedure, and pre-service comprises normalization, Iamge Segmentation, enhancing, binaryzation and refinement etc.The information such as fingerprint feature point and texture is comprised in initial fingerprint.Base-Band Processing and intelligent use processing module 1 can be extracted these information such as fingerprint feature point and texture, for the follow-up computations to initial fingerprint.
Password Input module 3 is for receiving the initial password of user's input.Password Input module 3 adopts touch display screen, by the dummy keyboard input password on touch display screen.
Base-Band Processing and intelligent use processing module 1 receive initial fingerprint and initial password, and utilize initial password to carry out symmetric encryption operation to initial fingerprint under trust zone safe mode, obtain cryptographic fingerprint, and this cryptographic fingerprint is stored into together with initial password its trust zone region, realize the encryption to intelligent mobile terminal.Because cryptographic fingerprint utilizes initial password to carry out symmetric cryptography to initial fingerprint to obtain, input different initial passwords and can obtain different cryptographic fingerprint, the accidental enciphering to initial fingerprint can be realized, promote the security of intelligent mobile terminal.
When deciphering intelligent mobile terminal, fingerprint identification module 2 Gather and input fingerprint, Password Input module 3 receives input password.The initial password stored in input password and trust zone region is compared by Base-Band Processing and intelligent use processing module 1, password comparison is precise alignment, if comparison is inconsistent, then stop decryption process, if comparison is consistent, then utilize input codon pair cryptographic fingerprint to carry out symmetrical decrypt operation, obtain decrypt fingerprint.
Symmetric cryptography is a kind of encryption method adopting one-key cryptosystem, same key can be used as the encryption and decryption of information simultaneously, sending out collection of letters both sides all uses these double secret key data to encrypt and decrypt, after destination receives ciphertext, original text is understood if want, then need to use the key of encryption and the algorithm for inversion of identical algorithms to be decrypted ciphertext, it just can be made to revert to readable plaintext.This encryption method is also referred to as secret key cryptography.Symmetric encryption operation can adopt XOR/invertible matrix to be multiplied/ring shift or DES symmetric encipherment algorithm.
Based on the principle of symmetric cryptography, if input password is consistent with the initial password stored in trust zone region, then the decrypt fingerprint that symmetrical decrypt operation obtains is carried out to cryptographic fingerprint, by with initial fingerprint, there is identical fingerprint characteristic.Now, can by this decrypt fingerprint and input fingerprint matching.Fingerprint matching is fuzzy matching, specifically, is geometry territory fuzzy diagnosis coupling, the mainly coupling of fingerprint characteristic point location and texture type.If mate unsuccessful, then again stop decryption process, if the match is successful, then the password of input and fingerprint are described all by checking, now then intelligent mobile terminal are unlocked.
Base-Band Processing and intelligent use processing module 1 also have Modify password pattern, in Modify password pattern, Password Input module 3 receives the Old Password of user's input, Base-Band Processing and intelligent use processing module 1 receive Old Password, and the initial password stored in Old Password and trust zone region is compared, and utilize Old Password to carry out symmetrical decrypt operation to cryptographic fingerprint when comparison is consistent, obtain decrypt fingerprint, simultaneously, the new password of user's input is received by Password Input module 3, and utilize this new password to re-start symmetric cryptography to this decrypt fingerprint, obtain new cryptographic fingerprint, and this new cryptographic fingerprint is stored into trust zone region together with this new password.
Intelligent use processor is also connected with other functional modules, comprises radio-frequency module 8, audio-frequency module 5, camera 4 and power management module 7 etc.Radio-frequency module 8 is connected with antenna 9, for the transmitting-receiving of radiofrequency signal.Memory module 6 comprises EMMCP chip and TF card, supports high speed storing.Audio-frequency module 5 is connected with microphone and loudspeaker, for driving microphone and loudspeaker.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1., based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, comprising:
Fingerprint identification module, for gathering the initial fingerprint of user's input;
Password Input module, for receiving the initial password of described user input;
Base-Band Processing and intelligent use processing module, it supports trust zone framework, for receiving described initial fingerprint and described initial password, and utilize described initial password to carry out symmetric encryption operation to described initial fingerprint under trust zone safe mode, obtain cryptographic fingerprint, and this cryptographic fingerprint is stored into together with described initial password its trust zone region, realize the encryption to described intelligent mobile terminal;
When to described intelligent mobile terminal deciphering:
Described fingerprint identification module is also for Gather and input fingerprint;
Described Password Input module is also for receiving input password;
Described Base-Band Processing and intelligent use processing module are also for comparing the initial password stored in described input password and trust zone region, and utilize cryptographic fingerprint described in described input codon pair to carry out symmetrical decrypt operation when comparison is consistent, obtain decrypt fingerprint, and by this decrypt fingerprint and described input fingerprint matching, and when the match is successful, described intelligent mobile terminal is unlocked.
2., as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described Base-Band Processing and intelligent use processing module also have Modify password pattern; In Modify password pattern:
Described Password Input module is also for receiving the Old Password of described user input;
Described Base-Band Processing and intelligent use processing module are also for receiving described Old Password, and the initial password stored in described Old Password and trust zone region is compared, and utilize described Old Password to carry out symmetrical decrypt operation to described cryptographic fingerprint when comparison is consistent, obtain decrypt fingerprint, simultaneously, the new password of described user input is received by described Password Input module, and utilize this new password to re-start symmetric cryptography to this decrypt fingerprint, obtain new cryptographic fingerprint, and this new cryptographic fingerprint is stored into trust zone region together with this new password.
3. as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described symmetric encryption operation is that XOR/invertible matrix is multiplied/ring shift or DES symmetric encipherment algorithm.
4., as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described fingerprint identification module is capacitive fingerprint sensing device.
5., as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described Password Input module is touch display screen.
6., as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described Base-Band Processing and intelligent use processing module are connected with radio-frequency module; This radio-frequency module is connected with antenna.
7., as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described Base-Band Processing and intelligent use processing module are connected with memory module.
8., as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described Base-Band Processing and intelligent use processing module are connected with audio-frequency module; Described audio-frequency module is connected with microphone and loudspeaker, for driving described microphone and loudspeaker.
9., as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, described Base-Band Processing and intelligent use processing module are connected with camera.
10. as claimed in claim 1 based on the random encrypting and deciphering system of intelligent mobile terminal of fingerprint characteristic, it is characterized in that, the kernel of described Base-Band Processing and intelligent use processing module is ARM Cortex A series polycaryon processor.
CN201510298775.6A 2015-06-03 2015-06-03 The random encrypting and deciphering system of intelligent mobile terminal based on fingerprint characteristic Active CN104915584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510298775.6A CN104915584B (en) 2015-06-03 2015-06-03 The random encrypting and deciphering system of intelligent mobile terminal based on fingerprint characteristic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510298775.6A CN104915584B (en) 2015-06-03 2015-06-03 The random encrypting and deciphering system of intelligent mobile terminal based on fingerprint characteristic

Publications (2)

Publication Number Publication Date
CN104915584A true CN104915584A (en) 2015-09-16
CN104915584B CN104915584B (en) 2018-01-05

Family

ID=54084646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510298775.6A Active CN104915584B (en) 2015-06-03 2015-06-03 The random encrypting and deciphering system of intelligent mobile terminal based on fingerprint characteristic

Country Status (1)

Country Link
CN (1) CN104915584B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105868718A (en) * 2016-03-30 2016-08-17 宁波三博电子科技有限公司 Fingerprint identification method and system based on redundant error sequence arrangement algorithm
CN105893950A (en) * 2016-03-30 2016-08-24 宁波三博电子科技有限公司 Adaptive fingerprint identification method and system based on redundancy error sequence ranking algorithm
CN105893803A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Encryption method for mobile hard disk
CN105893855A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Fingerprint encryption method for mobile hard disk
CN105893820A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Voiceprint encryption method for mobile hard disk
WO2017045594A1 (en) * 2015-09-17 2017-03-23 深圳三元色数码科技有限公司 Anti-counterfeit method
CN106897595A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of mobile terminal
CN107403152A (en) * 2017-07-19 2017-11-28 大唐终端技术有限公司 High-pass platform TrustZone fingerprint recognition realization method and systems
CN107506111A (en) * 2017-08-30 2017-12-22 维沃移动通信有限公司 The encryption and decryption method and terminal of a kind of terminal applies
CN108491703A (en) * 2018-01-29 2018-09-04 浙江大学 A kind of double verification unlocking method and system based on comprehensive screen equipment
CN109978535A (en) * 2017-12-28 2019-07-05 李耀庭 A kind of private key processing method of stored value card
CN110401538A (en) * 2018-04-24 2019-11-01 北京握奇智能科技有限公司 Data ciphering method, system and terminal
CN111582098A (en) * 2020-04-28 2020-08-25 北京集创北方科技股份有限公司 Fingerprint image encryption, identification and decryption methods, storage medium and terminal
CN116781790A (en) * 2023-08-25 2023-09-19 国网江西省电力有限公司电力科学研究院 Instrument specification intelligent conversion system, method, readable medium and electronic device

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101046900A (en) * 2006-03-31 2007-10-03 周强高 Credit card safety technology of identified combined by biological intelligent identification and double cipher
US20080104409A1 (en) * 2006-10-31 2008-05-01 Kabushiki Kaisha Toshiba Information Processing Apparatus and Time and Date Information Change Method
US20110002461A1 (en) * 2007-05-11 2011-01-06 Validity Sensors, Inc. Method and System for Electronically Securing an Electronic Biometric Device Using Physically Unclonable Functions
US20110126024A1 (en) * 2004-06-14 2011-05-26 Rodney Beatson Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
CN102387161A (en) * 2011-12-14 2012-03-21 创新科存储技术有限公司 Authentication method
CN202854880U (en) * 2012-09-26 2013-04-03 深圳市亚略特生物识别科技有限公司 SMS payment system based on fingerprint identification mobile phone
CN103618611A (en) * 2013-12-04 2014-03-05 天津大学 Identity verification method based on challenge responses and fingerprint identification
CN104200363A (en) * 2014-08-11 2014-12-10 济南曼维信息科技有限公司 Fingerprint-encryption-based electronic purse system payment method
CN104408356A (en) * 2014-11-28 2015-03-11 北京大唐智能卡技术有限公司 Fingerprint authentication method and system and fingerprint template encrypting device
CN104462911A (en) * 2013-09-25 2015-03-25 南京神盾信息技术有限公司 Method for achieving identity authentication on mobile terminal
CN104507087A (en) * 2014-12-19 2015-04-08 上海斐讯数据通信技术有限公司 Security service system and security service method for mobile office work
CN104574088A (en) * 2015-02-04 2015-04-29 华为技术有限公司 Payment authorization method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110126024A1 (en) * 2004-06-14 2011-05-26 Rodney Beatson Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
CN101046900A (en) * 2006-03-31 2007-10-03 周强高 Credit card safety technology of identified combined by biological intelligent identification and double cipher
US20080104409A1 (en) * 2006-10-31 2008-05-01 Kabushiki Kaisha Toshiba Information Processing Apparatus and Time and Date Information Change Method
US20110002461A1 (en) * 2007-05-11 2011-01-06 Validity Sensors, Inc. Method and System for Electronically Securing an Electronic Biometric Device Using Physically Unclonable Functions
CN102387161A (en) * 2011-12-14 2012-03-21 创新科存储技术有限公司 Authentication method
CN202854880U (en) * 2012-09-26 2013-04-03 深圳市亚略特生物识别科技有限公司 SMS payment system based on fingerprint identification mobile phone
CN104462911A (en) * 2013-09-25 2015-03-25 南京神盾信息技术有限公司 Method for achieving identity authentication on mobile terminal
CN103618611A (en) * 2013-12-04 2014-03-05 天津大学 Identity verification method based on challenge responses and fingerprint identification
CN104200363A (en) * 2014-08-11 2014-12-10 济南曼维信息科技有限公司 Fingerprint-encryption-based electronic purse system payment method
CN104408356A (en) * 2014-11-28 2015-03-11 北京大唐智能卡技术有限公司 Fingerprint authentication method and system and fingerprint template encrypting device
CN104507087A (en) * 2014-12-19 2015-04-08 上海斐讯数据通信技术有限公司 Security service system and security service method for mobile office work
CN104574088A (en) * 2015-02-04 2015-04-29 华为技术有限公司 Payment authorization method and device

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017045594A1 (en) * 2015-09-17 2017-03-23 深圳三元色数码科技有限公司 Anti-counterfeit method
US10749682B2 (en) 2015-09-17 2020-08-18 Shenzhen Qianhai Quantum Cloud Technology Co., Ltd. Anti-counterfeit method
CN105893950B (en) * 2016-03-30 2019-04-26 浙江凯迪仕实业有限公司 A kind of adaptive fingerprint identification method and system based on redundancy incorrect order permutation algorithm
CN105868718B (en) * 2016-03-30 2019-05-07 深圳市光千合新材料科技有限公司 A kind of fingerprint identification method and system based on redundancy incorrect order permutation algorithm
CN105893820A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Voiceprint encryption method for mobile hard disk
CN105893803A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Encryption method for mobile hard disk
CN105893855A (en) * 2016-03-30 2016-08-24 苏州美天网络科技有限公司 Fingerprint encryption method for mobile hard disk
CN105893950A (en) * 2016-03-30 2016-08-24 宁波三博电子科技有限公司 Adaptive fingerprint identification method and system based on redundancy error sequence ranking algorithm
CN105868718A (en) * 2016-03-30 2016-08-17 宁波三博电子科技有限公司 Fingerprint identification method and system based on redundant error sequence arrangement algorithm
CN106897595A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of mobile terminal
CN106897595B (en) * 2017-01-20 2020-04-03 北京安云世纪科技有限公司 Mobile terminal
CN107403152A (en) * 2017-07-19 2017-11-28 大唐终端技术有限公司 High-pass platform TrustZone fingerprint recognition realization method and systems
CN107403152B (en) * 2017-07-19 2020-07-31 大唐终端技术有限公司 High-pass platform TrustZone fingerprint identification implementation method and system
CN107506111A (en) * 2017-08-30 2017-12-22 维沃移动通信有限公司 The encryption and decryption method and terminal of a kind of terminal applies
CN109978535A (en) * 2017-12-28 2019-07-05 李耀庭 A kind of private key processing method of stored value card
CN108491703A (en) * 2018-01-29 2018-09-04 浙江大学 A kind of double verification unlocking method and system based on comprehensive screen equipment
CN110401538A (en) * 2018-04-24 2019-11-01 北京握奇智能科技有限公司 Data ciphering method, system and terminal
CN110401538B (en) * 2018-04-24 2022-04-22 北京握奇智能科技有限公司 Data encryption method, system and terminal
CN111582098A (en) * 2020-04-28 2020-08-25 北京集创北方科技股份有限公司 Fingerprint image encryption, identification and decryption methods, storage medium and terminal
CN116781790A (en) * 2023-08-25 2023-09-19 国网江西省电力有限公司电力科学研究院 Instrument specification intelligent conversion system, method, readable medium and electronic device
CN116781790B (en) * 2023-08-25 2023-12-05 国网江西省电力有限公司电力科学研究院 Instrument specification intelligent conversion system, method, readable medium and electronic device

Also Published As

Publication number Publication date
CN104915584B (en) 2018-01-05

Similar Documents

Publication Publication Date Title
CN104915584A (en) Intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics
EP3257194B1 (en) Systems and methods for securely managing biometric data
US10146983B2 (en) Fingerprint decryption method and device
CN103793815B (en) Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards
US7805615B2 (en) Asymmetric cryptography with user authentication
US20100138667A1 (en) Authentication using stored biometric data
CN110969431B (en) Secure hosting method, device and system for private key of blockchain digital coin
US20140093144A1 (en) More-Secure Hardware Token
US11580208B2 (en) System and method for PIN entry on mobile devices
CN105117658B (en) A kind of cryptosecurity management method and equipment based on finger print identifying
CN111915306B (en) Service data verification method and verification platform
US20110154485A1 (en) Authentication apparatus using human body communication, portable device having authentication function using human body communication, and authentication method using human body communication
CN107590025A (en) A kind of back-up restoring method and system
CA2686801C (en) Authetication using stored biometric data
CN101488111A (en) Identification authentication method and system
CN102236607B (en) Data security protection method and data security protection device
CN105095719A (en) Fingerprint unlocking method and system and electronic device provided with system
CN114341907A (en) Body area network assisted authentication or payment authorization
CN104462926A (en) Intelligent card identity recognition method and system
WO2019232766A1 (en) Trading method, hardware wallet and trading device
CN105631352A (en) Encoding and decoding methods, encoding and decoding apparatuses and mobile terminal
CN202711243U (en) Encryption type movable storage device based on fingerprint authentication
US10771970B2 (en) Method of authenticating communication of an authentication device and at least one authentication server using local factor
CN103514540A (en) USBKEY business realization method and system
KR20090132818A (en) Double security system using usb token finger print

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518000 B, block 1079, garden city digital garden, Nanhai Road, Shekou, Shenzhen, Guangdong, 503, Nanshan District 602, China

Applicant after: SHENZHEN WOTE WODE CO., LTD.

Address before: 518000 B, block 1079, garden city digital garden, Nanhai Road, Shekou, Shenzhen, Guangdong, 503, Nanshan District 602, China

Applicant before: Shenzhen Water World Technology Co., Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210922

Address after: 518000 201, No.26, yifenghua Innovation Industrial Park, Xinshi community, Dalang street, Longhua District, Shenzhen City, Guangdong Province

Patentee after: Shenzhen waterward Information Co.,Ltd.

Address before: 518000 Shenzhen City, Guangdong Province 503, 602, block B, garden city digital building, No. 1079, Nanhai Avenue, Shekou, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN WATER WORLD Co.,Ltd.