CN105354466A - Fingerprint recognition method and mobile terminal - Google Patents

Fingerprint recognition method and mobile terminal Download PDF

Info

Publication number
CN105354466A
CN105354466A CN201510705895.3A CN201510705895A CN105354466A CN 105354466 A CN105354466 A CN 105354466A CN 201510705895 A CN201510705895 A CN 201510705895A CN 105354466 A CN105354466 A CN 105354466A
Authority
CN
China
Prior art keywords
fingerprint
security chip
embedded security
fingerprint recognition
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510705895.3A
Other languages
Chinese (zh)
Other versions
CN105354466B (en
Inventor
廖兴保
雷钊
唐纯杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weaver mobile communications (Shenzhen) Co., Ltd.
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201510705895.3A priority Critical patent/CN105354466B/en
Publication of CN105354466A publication Critical patent/CN105354466A/en
Application granted granted Critical
Publication of CN105354466B publication Critical patent/CN105354466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a fingerprint recognition method and a mobile terminal. The method is applied to the mobile terminal which is provided with an embedded security chip and a confidence region module. The method comprises the following steps of: enabling the embedded security chip to acquire a fingerprint image input by a current user when receiving a fingerprint recognition instruction; performing feature extraction on the fingerprint image so as to obtain fingerprint features; sending the fingerprint features to a microprocessor of the embedded security chip and enabling the microprocessor of the embedded security chip to perform data processing and fingerprint recognition on the fingerprint features, so as to obtain a fingerprint recognition result; enabling the embedded security chip to send the fingerprint recognition result to the confidence region module; and enabling the confidence region module to perform digital signature on the fingerprint recognition result, then sending the fingerprint recognition result subjected to digital signature to the mobile terminal, thereby finishing fingerprint recognition. According to the fingerprint recognition method and the mobile terminal, a fingerprint recognition process is maliciously tampered.

Description

A kind of fingerprint identification method and mobile terminal
Technical field
The present invention relates to the communications field, and more specifically, relate to a kind of fingerprint identification method and mobile terminal.
Background technology
Along with the fast development of mobile Internet, mobile payment is bright and clear as the trend of the pith of payment technical field.Under the promotion of mobile payment tide, the quick emergence of mobile payment not only brings facility to consumer, also leaves corresponding potential safety hazard, and wherein, safety of payment becomes one of problem that everybody is concerned about the most undoubtedly.
Fingerprint pays a kind of mode identifying identity as mobile payment, has a wide range of applications in mobile payment field.The technological core that fingerprint pays is fingerprint identification technology, and fingerprint recognition belongs to biological identification technology, because of its not transreplication, without the need to worrying characteristic of losing or to pass into silence etc., possess the safe class higher than ordinary password.
At present, some intelligent terminals, generally carry out fingerprint recognition by pure software or in intelligent terminal internal build hardware trusted context two kinds of modes.Due to the opening of operating system, the encrypting fingerprint mode of pure software is difficult to the attack of resisting computer virus; And hardware trusted context mode runs a Mach as embedded safety system, very little to the hardware modifications of intelligent terminal system, cost is low, certain demand for security can be met, but only can provide appropriate safety, cannot ensure that related data reciprocal process outside hardware trusted context is not by malicious attack or distort, and can not meet large amount and pay demand.
Summary of the invention
The embodiment of the present invention provides a kind of fingerprint identification method and mobile terminal, carry out fingerprint recognition to solve existing intelligent terminal by pure software or in intelligent terminal internal build hardware trusted context two kinds of modes, the fingerprint being difficult to provide security intensity high pays the problem ensured.
First aspect, The embodiment provides a kind of fingerprint identification method, and be applied to the mobile terminal that is provided with embedded security chip and trusted area module, the method comprises:
When receiving the instruction of fingerprint recognition, embedded security chip is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to fingerprint image, obtains fingerprint characteristic;
Described fingerprint characteristic is sent to the microprocessor of described embedded security chip, makes the microprocessor of described embedded security chip carry out data processing to described fingerprint characteristic and carry out fingerprint recognition, obtain fingerprint recognition result;
Make described embedded security chip that described fingerprint recognition result is sent to described trusted area module;
Make described trusted area module carry out digital signature to described fingerprint recognition result, and the fingerprint recognition result after digital signature is sent to described mobile terminal, complete fingerprint recognition.
On the other hand, embodiments of the invention additionally provide a kind of mobile terminal, and described mobile terminal includes embedded security chip and trusted area module, and described mobile terminal also comprises:
Acquisition module, for when receiving the instruction of fingerprint recognition, makes embedded security chip obtain the fingerprint image of active user's input;
Characteristic extracting module, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic;
Identification module, for described fingerprint characteristic being sent to the microprocessor of described embedded security chip, making the microprocessor of described embedded security chip carry out data processing to described fingerprint characteristic and carry out fingerprint recognition, obtaining fingerprint recognition result;
Sending module, is sent to described trusted area module for making described embedded security chip by described fingerprint recognition result;
Signature blocks, for making described trusted area module carry out digital signature to described fingerprint recognition result, and being sent to described mobile terminal by the fingerprint recognition result after digital signature, completing fingerprint recognition.
Like this, fingerprint identification method provided by the invention, on the one hand, by the differentiation process of the feature extraction and fingerprint characteristic that make fingerprint image at embedded security chip internal operation, long-range attack cannot invade chip internal, cannot obtain or distort fingerprint characteristic, comparison result etc., fundamentally having resisted long-range attack; On the other hand, differentiation result is sent in trusted area module and preserves by embedded security chip, due to the security of self of trusted area module, differentiates that result also can not be maliciously tampered in module.Whole fingerprint identification process completes by the present invention respectively in embedded security chip and trusted area module; by the combination of embedded security chip and trusted area module; while not reducing Consumer's Experience; improve the security that fingerprint pays; fingerprint identification process is avoided to be remotely controlled or other modes malice is distorted, the fund security of protection user.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 represents the basic step process flow diagram of the fingerprint identification method that the first embodiment of the present invention provides;
Fig. 2 represents the basic step process flow diagram of the fingerprint identification method that the second embodiment of the present invention provides;
Fig. 3 is the block diagram of the mobile terminal that third embodiment of the invention provides;
Fig. 4 is the block diagram of the mobile terminal that fourth embodiment of the invention provides;
Fig. 5 is the block diagram of the mobile terminal that fifth embodiment of the invention provides;
Fig. 6 is the block diagram of the mobile terminal that fifth embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
First embodiment
The first embodiment of the present invention provides a kind of fingerprint identification method, be applied to the mobile terminal that is provided with embedded security chip and trusted area module, first obtain fingerprint by embedded security chip and carry out fingerprint differentiation, again differentiation result is sent to trusted area module, after making trusted area module carry out digital signature to differentiation result, is sent to mobile terminal again.
Particularly, see Fig. 1, the first embodiment of the present invention provides a kind of fingerprint identification method, and the method comprises:
Step 101, when receiving the instruction of fingerprint recognition, makes embedded security chip obtain the fingerprint image of active user's input.
Wherein, the acquisition of fingerprint image is carried out in embedded security chip inside, and long-range attack cannot invade chip internal, cannot obtain or distort fingerprint characteristic.
Step 102, carries out feature extraction to fingerprint image, obtains fingerprint characteristic.
In the embodiment of the present invention, in fingerprint identification technology, directly do not store fingerprint image, but the feature of the image that takes the fingerprint in fingerprint image.Fingerprint characteristic comprises the expansion type feature of fingerprint and the spectrum signature etc. of fingerprint.
Step 103, is sent to the microprocessor of embedded security chip by fingerprint characteristic, make the microprocessor of embedded security chip carry out data processing to fingerprint characteristic and carry out fingerprint recognition, obtain fingerprint recognition result.
In the embodiment of the present invention, fingerprint identification process is at embedded security chip internal operation, and long-range attack cannot invade chip internal, cannot obtain or distort comparison result, has fundamentally resisted long-range attack.
Step 104, makes embedded security chip that fingerprint recognition result is sent to trusted area module.
In the embodiment of the present invention, trusted area module (TrustZone) is a part for mobile terminal hardware configuration, mutually isolated with the operating system of mobile terminal, is the security system of an isolated operation.Trusted area module self has security, differentiates that result can not be maliciously tampered in module.
Step 105, makes trusted area module carry out digital signature to fingerprint recognition result, and the fingerprint recognition result after digital signature is sent to mobile terminal, completes fingerprint recognition.
Particularly; digital signature is exactly some data be attached in data cell; or to the cryptographic transformation that data cell is done; this data or cryptographic transformation allow the recipient of data cell in order to the integrality in the source and data cell that confirm data cell and protected data, prevent from maliciously being forged.It is a kind of method of signing to the message of electronic form, and a signature information can be transmitted in a communication network; Briefly, digital signature is a kind of method for discriminating digit information, and only have the sender of information could produce, others data that cannot forge, these data are also the valid certificates sender of information being sent to information authenticity simultaneously.
In the embodiment of the present invention, trusted area module carries out digital signature to differentiation result, and the fingerprint recognition result after digital signature is sent to mobile terminal, completes fingerprint recognition.Other programs cannot forge this digital signature, cannot maliciously distort differentiation result.
In the above embodiment of the present invention, after obtaining fingerprint image to be identified, after carrying out feature extraction, be sent to the microprocessor of embedded security chip, in embedded security chip, complete differentiation process, and directly differentiation result is sent to trusted area module.Because the feature extraction of fingerprint image and the differentiation process of fingerprint characteristic are all at embedded security chip internal operation, long-range attack cannot invade chip internal, cannot obtain or distort fingerprint characteristic, comparison result etc., has fundamentally resisted long-range attack; On the other hand, in embodiments of the invention, differentiation result is sent in trusted area module and preserves by embedded security chip, due to the security of self of trusted area module, differentiates that result also can not be maliciously tampered in module.
In the above embodiment of the present invention; whole fingerprint identification process is completed respectively in embedded security chip and trusted area module; by the combination of embedded security chip and trusted area module; while not reducing Consumer's Experience; improve the security that fingerprint pays; fingerprint identification process is avoided to be remotely controlled or other modes malice is distorted, the fund security of protection user.
Before step 101, comprise further:
When receiving user and storing the instruction of fingerprint template, embedded security chip is made to obtain the fingerprint image for storing of this user input;
Make the microprocessor of embedded security chip carry out data processing to the fingerprint image obtained, obtain the fingerprint template of this user and preserve.
Wherein, the built-in key of embedded security chip is write by disposable fusing when chip dispatches from the factory, cannot from exterior read-write and amendment, and therefore, external program cannot obtain the built-in key of embedded security chip, cannot go out fingerprint template according to key recovery.
Further, data processing is carried out to the fingerprint image obtained, obtains the fingerprint template of this user and preserve, specifically comprising:
The microprocessor of embedded security chip being encrypted the fingerprint image for storing according to built-in algorithm, obtaining fingerprint template and preserving.
In the above embodiment of the present invention, when receiving the instruction storing fingerprint template, obtain the fingerprint image for storing, and according to built-in algorithm, the fingerprint image for storing is encrypted by microprocessor, obtain fingerprint template and preserve.Because external program cannot restore fingerprint template by breaking cryptographic keys, therefore, in the above embodiment of the present invention, the preservation security of fingerprint template is higher, and external program cannot distort fingerprint recognition result by reduction fingerprint template.
Second embodiment
As shown in Figure 2, the second embodiment of the present invention provides a kind of fingerprint identification method, and be applied to the mobile terminal that is provided with embedded security chip and trusted area module, the method comprises:
Step 201, when receiving the instruction of fingerprint recognition, the fingerprint image obtaining active user's input makes embedded security chip obtain the fingerprint image of active user's input.
In this step, the acquisition of fingerprint image is carried out in embedded security chip inside, and long-range attack cannot invade chip internal, cannot obtain or distort fingerprint characteristic.
Step 202, carries out feature extraction to fingerprint image, obtains fingerprint characteristic.
In the embodiment of the present invention, in fingerprint identification technology, directly do not store fingerprint image, but the feature of the image that takes the fingerprint in fingerprint image.Fingerprint characteristic comprises the expansion type feature of fingerprint and the spectrum signature etc. of fingerprint.
Step 203, makes the microprocessor of embedded security chip be encrypted fingerprint characteristic according to built-in algorithm, obtains cryptographic fingerprint information.
Wherein, first the microprocessor of embedded security chip is encrypted fingerprint characteristic according to built-in algorithm, because external program cannot crack the key of embedded security chip, therefore cannot carry out malice to fingerprint characteristic and distort.
Step 204, the recognition rule according to presetting in embedded security chip identifies cryptographic fingerprint information and fingerprint template, obtains fingerprint recognition result.
Wherein, cryptographic fingerprint information and fingerprint template are identified, draw recognition result, whole process is at embedded chip internal operation, and data can not be intercepted and captured by external program or distort.
Step 205, makes embedded security chip that fingerprint recognition result is sent to trusted area module.
In the embodiment of the present invention, trusted area module (TrustZone) is a part for mobile terminal hardware configuration, mutually isolated with the operating system of mobile terminal, is the security system of an isolated operation.Trusted area module self has security, differentiates that result can not be maliciously tampered in module.
Step 206, makes trusted area module carry out digital signature to fingerprint recognition result, and the fingerprint recognition result after digital signature is sent to mobile terminal, completes fingerprint recognition.
Particularly; digital signature is exactly some data be attached in data cell; or to the cryptographic transformation that data cell is done; this data or cryptographic transformation allow the recipient of data cell in order to the integrality in the source and data cell that confirm data cell and protected data, prevent from maliciously being forged.It is a kind of method of signing to the message of electronic form, and a signature information can be transmitted in a communication network; Briefly, digital signature is a kind of method for discriminating digit information, and only have the sender of information could produce, others data that cannot forge, these data are also the valid certificates sender of information being sent to information authenticity simultaneously.
In the embodiment of the present invention, trusted area module carries out digital signature to fingerprint recognition result, and the fingerprint recognition result after digital signature is sent to mobile terminal, completes fingerprint recognition, other programs cannot forge this digital signature, cannot maliciously distort differentiation result.
Further, step 204 specifically comprises:
Obtain the similarity discriminant value in the recognition rule preset, and contrast the similarity of cryptographic fingerprint information and fingerprint template:
If the similarity of cryptographic fingerprint information and fingerprint template is more than or equal to similarity discriminant value, generate correct fingerprint recognition result;
If the similarity of cryptographic fingerprint information and fingerprint template is less than similarity discriminant value, the fingerprint recognition result of generation error.
In the above embodiment of the present invention, first the microprocessor of embedded security chip is encrypted fingerprint characteristic according to built-in algorithm, again cryptographic fingerprint information and fingerprint template are identified, draw recognition result, whole process is at embedded chip internal operation, data can not be intercepted and captured by external program or distort, and external program cannot carry out tamper Detection result by attacking differentiation process.In the above embodiment of the present invention, differentiating that the safety curtain of process improves the security of fingerprint recognition by increasing fingerprint, avoiding fingerprint identification process to be remotely controlled or other modes malice are distorted, the fund security of protection user.
3rd embodiment
The introduction of the above first embodiment of the present invention to the second embodiment be the content of the method for fingerprint recognition provided by the invention, introduce the mobile terminal that the fourth embodiment of the present invention provides below.
See the block diagram that Fig. 3, Fig. 3 are the mobile terminals that third embodiment of the invention provides.Mobile terminal 300 shown in Fig. 3 comprises: acquisition module 301, characteristic extracting module 302, identification module 303, sending module 304 and signature blocks 305.
Acquisition module 301, for when receiving the instruction of fingerprint recognition, makes embedded security chip obtain the fingerprint image of active user's input;
Wherein, the acquisition of fingerprint image is carried out in embedded security chip inside, and long-range attack cannot invade chip internal, cannot obtain or distort fingerprint characteristic.
Characteristic extracting module 302, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic.
Identification module 303, for fingerprint characteristic being sent to the microprocessor of embedded security chip, making the microprocessor of embedded security chip carry out data processing to fingerprint characteristic and carry out fingerprint recognition, obtaining fingerprint recognition result.
Wherein, fingerprint identification process is at embedded security chip internal operation, and long-range attack cannot invade chip internal, cannot obtain or distort comparison result, has fundamentally resisted long-range attack.
Sending module 304, is sent to trusted area module for making embedded security chip by fingerprint recognition result.
Signature blocks 305, for making trusted area module carry out digital signature to fingerprint recognition result, and being sent to mobile terminal by the fingerprint recognition result after digital signature, completing fingerprint recognition.
Wherein, trusted area module carries out digital signature to differentiation result, and other programs cannot forge this digital signature, cannot maliciously distort differentiation result.
The mobile terminal that the above embodiment of the present invention provides; whole fingerprint identification process is completed respectively in embedded security chip and trusted area module; by the combination of embedded security chip and trusted area module; while not reducing Consumer's Experience; improve the security that fingerprint pays; fingerprint identification process is avoided to be remotely controlled or other modes malice is distorted, the fund security of protection user.
4th embodiment
On the basis of Fig. 3, alternatively, mobile terminal 300 also comprises: template acquisition module and template preserve module, identification module 303 comprises: encryption submodule and fingerprint recognition submodule, see Fig. 4, Fig. 4 is the block diagram of the mobile terminal that fourth embodiment of the invention provides, mobile terminal 400 shown in Fig. 4 comprises: acquisition module 401, characteristic extracting module 402, and identification module 403, encryption submodule 4031, fingerprint recognition submodule 4032, sending module 304, signature blocks 405, template acquisition module 406 and template preserve module 407:
Acquisition module 401, for when receiving the instruction of fingerprint recognition, makes embedded security chip obtain the fingerprint image of active user's input.
Characteristic extracting module 402, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic.
Identification module 403, for fingerprint characteristic being sent to the microprocessor of embedded security chip, making the microprocessor of embedded security chip carry out data processing to fingerprint characteristic and carry out fingerprint recognition, obtaining fingerprint recognition result.
Wherein, identification module 403 comprises encryption submodule 4031 and fingerprint recognition submodule 4032.
Encryption submodule 4031, for making the microprocessor of embedded security chip be encrypted fingerprint characteristic according to built-in algorithm, obtains cryptographic fingerprint information.
Fingerprint recognition submodule 4032, for identifying cryptographic fingerprint information and fingerprint template according to the recognition rule preset in embedded security chip, obtains fingerprint recognition result.
Wherein, first the microprocessor of embedded security chip is encrypted fingerprint characteristic according to built-in algorithm, because external program cannot crack the key of embedded security chip, therefore cannot carry out malice to fingerprint characteristic and distort.
Alternatively, fingerprint recognition submodule 4032 specifically for:
Obtain the similarity discriminant value in the recognition rule preset, and contrast the similarity of cryptographic fingerprint information and fingerprint template:
If the similarity of cryptographic fingerprint information and fingerprint template is more than or equal to similarity discriminant value, generate correct fingerprint recognition result;
If the similarity of cryptographic fingerprint information and fingerprint template is less than similarity discriminant value, the fingerprint recognition result of generation error.
Sending module 404, is sent to trusted area module for making embedded security chip by fingerprint recognition result;
Signature blocks 405, for making trusted area module carry out digital signature to fingerprint recognition result, and being sent to mobile terminal by the fingerprint recognition result after digital signature, completing fingerprint recognition.
Template acquisition module 406, for when acquisition module 401 receives the instruction of fingerprint recognition, before making the fingerprint image of embedded security chip acquisition active user input,
When receiving user and storing the instruction of fingerprint template, embedded security chip is made to obtain the fingerprint image for storing of this user input;
Template preserves module 407, for making the microprocessor of embedded security chip carry out data processing to the fingerprint image obtained, obtaining the fingerprint template of this user and preserving.
Wherein, the built-in key of embedded security chip is write by disposable fusing when chip dispatches from the factory, cannot from exterior read-write and amendment, and therefore, external program cannot obtain the built-in key of embedded security chip, cannot go out fingerprint template according to key recovery.
Alternatively, template preserve module 407 specifically for:
The microprocessor of described embedded security chip being encrypted the described fingerprint image for storing according to built-in algorithm, obtaining fingerprint template and preserving.
The mobile terminal that the above embodiment of the present invention provides, when receiving the instruction storing fingerprint template, obtain the fingerprint image for storing, and according to built-in algorithm, the fingerprint image for storing is encrypted by microprocessor, obtain fingerprint template and preserve.Because external program cannot restore fingerprint template by breaking cryptographic keys, therefore, in the mobile terminal that the above embodiment of the present invention provides, the preservation security of fingerprint template is higher, and external program cannot distort fingerprint recognition result by reduction fingerprint template.
Mobile terminal in above-described embodiment can realize each process that in the embodiment of the method for Fig. 1 to Fig. 2, mobile terminal realizes, and for avoiding repetition, repeats no more here.In the mobile terminal that the above embodiment of the present invention provides, first the microprocessor of embedded security chip is encrypted fingerprint characteristic according to built-in algorithm, again cryptographic fingerprint information and fingerprint template are identified, draw recognition result, whole process is at embedded chip internal operation, data can not be intercepted and captured by external program or distort, and external program cannot carry out tamper Detection result by attacking differentiation process.
5th embodiment
Fig. 5 is the block diagram of the mobile terminal of fifth embodiment of the invention.Mobile terminal 500 shown in Fig. 5 comprises: at least one processor 501, storer 502, at least one network interface 504, other user interfaces 503, embedded security chip 506 and trusted area module 507.Each assembly in mobile terminal 500 is coupled by bus system 505.Can understand, bus system 505 is for realizing the connection communication between these assemblies.Bus system 505, except comprising data bus, also comprises power bus, control bus and status signal bus in addition.But for the purpose of clearly demonstrating, in Figure 5 various bus is all designated as bus system 505.
Wherein, user interface 503 can comprise display, keyboard or pointing device (such as, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc.
Be appreciated that the storer 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory, maybe can comprise volatibility and nonvolatile memory.Wherein, nonvolatile memory can be ROM (read-only memory) (Read-OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) or flash memory.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (StaticRAM, SRAM), dynamic RAM (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRateSDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (EnhancedSDRAM, ESDRAM), synchronized links dynamic RAM (SynchlinkDRAM, and direct rambus random access memory (DirectRambusRAM SLDRAM), DRRAM).The storer 502 of system and method described herein is intended to include but not limited to the storer of these and other applicable type arbitrarily.
In some embodiments, storer 502 stores following element, executable module or data structure, or their subset, or their superset: operating system 5021 and application program 5022.
Wherein, operating system 5021, comprises various system program, such as ccf layer, core library layer, driving layer etc., for realizing various basic business and processing hardware based task.Application program 5022, comprises various application program, such as media player (MediaPlayer), browser (Browser) etc., for realizing various applied business.The program realizing embodiment of the present invention method can be included in application program 5022.
Wherein, data communication is carried out between embedded security chip 506 and processor 501 and trusted area module 507, embedded security chip 506 built-in key, and be write by disposable fusing when chip dispatches from the factory, cannot from exterior read-write and amendment, therefore, external program cannot crack the built-in key of embedded security chip 506.
Wherein, trusted area module 507 is parts of mobile terminal 500 hardware configuration, and carry out data communication between embedded security chip 506 and mobile terminal 500, and mutually isolated with the operating system of mobile terminal 500, be the security system of an isolated operation.Trusted area module 507 self has security, and the data of storage inside can not be maliciously tampered in module.
In embodiments of the present invention, by call storer 502 store program or instruction, concrete, can be in application program 5022 store program or instruction, processor 501 for:
When receiving the instruction of fingerprint recognition, embedded security chip 506 is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to fingerprint image, obtains fingerprint characteristic;
Fingerprint characteristic is sent to the microprocessor of described embedded security chip 506, makes the microprocessor of described embedded security chip 506 carry out data processing to described fingerprint characteristic and carry out fingerprint recognition, obtain fingerprint recognition result;
Described embedded security chip is made described fingerprint recognition result to be sent to described trusted area module trusted area module 507;
Make described trusted area module 507 carry out digital signature to described fingerprint recognition result, and the fingerprint recognition result after digital signature is sent to described mobile terminal, complete fingerprint recognition.
The method that the invention described above embodiment discloses can be applied in processor 501, or is realized by processor 501.Processor 501 may be a kind of integrated circuit (IC) chip, has the processing power of signal.In implementation procedure, each step of said method can be completed by the instruction of the integrated logic circuit of the hardware in processor 501 or software form.Above-mentioned processor 501 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), special IC (ApplicationSpecificIntegratedCircuit, ASIC), field programmable gate array (FieldProgrammableGateArray, FPGA) or other programmable logic device (PLD), discrete gate or transistor logic, discrete hardware components.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.The processor etc. of general processor can be microprocessor or this processor also can be any routine.Step in conjunction with the method disclosed in the embodiment of the present invention directly can be presented as that hardware decoding processor is complete, or combines complete by the hardware in decoding processor and software module.Software module can be positioned at random access memory, flash memory, ROM (read-only memory), in the storage medium of this area maturations such as programmable read only memory or electrically erasable programmable storer, register.This storage medium is positioned at storer 502, and processor 501 reads the information in storer 502, completes the step of said method in conjunction with its hardware.
Be understandable that, these embodiments described herein can realize with hardware, software, firmware, middleware, microcode or its combination.For hardware implementing, processing unit can be implemented in one or more special IC (ApplicationSpecificIntegratedCircuit, ASIC), digital signal processor (DigitalSignalProcessor, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD), field programmable gate array (FieldProgrammableGateArray, FPGA), general processor, controller, microcontroller, microprocessor, for performing in other electronic unit of function described in the application or its combination.
For software simulating, realize the techniques described herein by the module (such as process, function etc.) performing function described herein.Software code can be stored in memory and be performed by processor.Storer can realize within a processor or in processor outside.
Alternatively, processor 501 also for: when the instruction receiving fingerprint recognition, make before embedded security chip 506 obtains the fingerprint image of active user's input:
When receiving user and storing the instruction of fingerprint template, embedded security chip 506 is made to obtain the fingerprint image for storing of this user input;
Make the microprocessor of embedded security chip 506 carry out data processing to the fingerprint image obtained, obtain the fingerprint template of this user and preserve.
Alternatively, as another embodiment, processor 501 also for:
The microprocessor of embedded security chip 506 being encrypted the fingerprint image for storing according to built-in algorithm, obtaining fingerprint template and preserving.Alternatively, as another embodiment, processor 501 makes the microprocessor of embedded security chip 506 be encrypted fingerprint characteristic according to built-in algorithm, obtains cryptographic fingerprint information;
Recognition rule according to presetting in embedded security chip 506 identifies cryptographic fingerprint information and fingerprint template, obtains fingerprint recognition result.Alternatively, as another embodiment, processor 501 also for:
Obtain the similarity discriminant value in the recognition rule preset, and contrast the similarity of cryptographic fingerprint information and fingerprint template:
If the similarity of cryptographic fingerprint information and fingerprint template is more than or equal to similarity discriminant value, generate correct fingerprint recognition result;
If the similarity of cryptographic fingerprint information and fingerprint template is less than similarity discriminant value, the fingerprint recognition result of generation error.Mobile terminal 500 can realize each process that in previous embodiment, mobile terminal realizes, and for avoiding repetition, repeats no more here.
The mobile terminal provided in the above embodiment of the present invention, by detecting pattern edge, when the marginal position of the object in the touch operation and screen of user partially overlaps, generate fingerprint recognition signal and start feedback effects, make user produce one by touch operation and pull sense, to the more real experience of user.
6th embodiment
Fig. 6 is the structural representation of the mobile terminal of another embodiment of the present invention.Particularly, the mobile terminal 600 in Fig. 6 can be mobile phone, panel computer, personal digital assistant (PersonalDigitalAssistant, PDA) or vehicle-mounted computer etc.
Mobile terminal 600 in Fig. 6 comprises radio frequency (RadioFrequency, RF) circuit 610, storer 620, input block 630, display unit 640, processor 660, voicefrequency circuit 670, WiFi (WirelessFidelity) module 680, power supply 690, embedded security chip 6100 and trusted area module 6200.
Wherein, input block 630 can be used for the numeral or the character information that receive user's input, and generation arranges with the user of mobile terminal 600 and function controls the input of relevant signal.Particularly, in the embodiment of the present invention, this input block 630 can comprise contact panel 631.Contact panel 631, also referred to as touch-screen, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on contact panel 631 such as finger, stylus) thereon, and drive corresponding coupling arrangement according to the formula preset.Optionally, contact panel 631 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives this processor 660, and the order that energy receiving processor 660 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize contact panel 631.Except contact panel 631, input block 630 can also comprise other input equipments 632, other input equipments 632 can include but not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, control lever etc. one or more.
Wherein, display unit 640 can be used for the various menu interfaces showing information or the information being supplied to user and the mobile terminal 600 inputted by user.Display unit 640 can comprise display panel 641, optionally, the form such as LCD or Organic Light Emitting Diode (OrganicLight-EmittingDiode, OLED) can be adopted to configure display panel 641.
Should note, contact panel 631 can cover display panel 641, form touch display screen, when this touch display screen detects thereon or after neighbouring touch operation, send processor 660 to determine the type of touch event, on touch display screen, provide corresponding vision to export with preprocessor 660 according to the type of touch event.
Touch display screen comprises Application Program Interface viewing area and conventional control viewing area.The arrangement mode of this Application Program Interface viewing area and this conventional control viewing area does not limit, and can distinguish the arrangement mode of two viewing areas for be arranged above and below, left-right situs etc.This Application Program Interface viewing area may be used for the interface of display application program.Each interface can comprise the interface element such as icon and/or widget desktop control of at least one application program.This Application Program Interface viewing area can for not comprising the empty interface of any content yet.This conventional control viewing area, for showing the higher control of utilization rate, such as, arranges the application icons etc. such as button, interface numbering, scroll bar, phone directory icon.
Wherein, processor 660 is control centers of mobile terminal 600, utilize the various piece of various interface and the whole mobile phone of connection, software program in first memory 621 and/or module is stored in by running or performing, and call the data be stored in second memory 622, perform various function and the process data of mobile terminal 600, thus integral monitoring is carried out to mobile terminal 600.Optionally, processor 660 can comprise one or more processing unit.
Wherein, data communication is carried out between embedded security chip 6100 and processor 660 and trusted area module 6200, embedded security chip 6100 built-in key, and be write by disposable fusing when chip dispatches from the factory, cannot from exterior read-write and amendment, therefore, external program cannot crack the built-in key of embedded security chip 6100.
Wherein, trusted area module 6200 is parts of mobile terminal 600 hardware configuration, and carries out data communication between embedded security chip 6100, and mutually isolated with the operating system of mobile terminal 600, is the security system of an isolated operation.Trusted area module 6200 self has security, and the data of storage inside can not be maliciously tampered in module.
In embodiments of the present invention, by calling the data stored in software program in this first memory 621 and/or module and/or this second memory 622, processor 660 for:
When receiving the instruction of fingerprint recognition, embedded security chip 6100 is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to fingerprint image, obtains fingerprint characteristic;
Fingerprint characteristic is sent to the microprocessor of described embedded security chip 6100, makes the microprocessor of described embedded security chip 6100 carry out data processing to described fingerprint characteristic and carry out fingerprint recognition, obtain fingerprint recognition result;
Make described embedded security chip that described fingerprint recognition result is sent to described trusted area module 6200;
Make described trusted area module 6200 carry out digital signature to described fingerprint recognition result, and the fingerprint recognition result after digital signature is sent to described mobile terminal, complete fingerprint recognition.
Alternatively, processor 660 also for: when the instruction receiving fingerprint recognition, make before embedded security chip 6100 obtains the fingerprint image of active user's input:
When receiving user and storing the instruction of fingerprint template, embedded security chip 6100 is made to obtain the fingerprint image for storing of this user input;
Make the microprocessor of embedded security chip 6100 carry out data processing to the fingerprint image obtained, obtain the fingerprint template of this user and preserve.
Alternatively, as another embodiment, processor 660 also for:
The microprocessor of embedded security chip 6100 being encrypted the fingerprint image for storing according to built-in algorithm, obtaining fingerprint template and preserving.Alternatively, as another embodiment, processor 660 makes the microprocessor of embedded security chip 6100 be encrypted fingerprint characteristic according to built-in algorithm, obtains cryptographic fingerprint information;
Recognition rule according to presetting in embedded security chip 6100 identifies cryptographic fingerprint information and fingerprint template, obtains fingerprint recognition result.
Alternatively, as another embodiment, processor 660 also for:
Obtain the similarity discriminant value in the recognition rule preset, and contrast the similarity of cryptographic fingerprint information and fingerprint template:
If the similarity of cryptographic fingerprint information and fingerprint template is more than or equal to similarity discriminant value, generate correct fingerprint recognition result;
If the similarity of cryptographic fingerprint information and fingerprint template is less than similarity discriminant value, the fingerprint recognition result of generation error.Mobile terminal 600 can realize each process that in previous embodiment, mobile terminal realizes, and for avoiding repetition, repeats no more here.
If the similarity of cryptographic fingerprint information and fingerprint template is less than similarity discriminant value, the fingerprint recognition result of generation error.Mobile terminal 600 can realize each process that in previous embodiment, mobile terminal realizes, and for avoiding repetition, repeats no more here.
Visible, the mobile terminal provided in the above embodiment of the present invention, by detecting pattern edge, when the marginal position of the object in the touch operation and screen of user partially overlaps, generate fingerprint recognition signal and start feedback effects, make user produce one by touch operation and pull sense, to the more real experience of user.
Those of ordinary skill in the art can recognize, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with the combination of electronic hardware or computer software and electronic hardware.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the system of foregoing description, device and unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
In the embodiment that the application provides, should be understood that, disclosed apparatus and method, can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.
If described function using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part of the part that technical scheme of the present invention contributes to prior art in essence in other words or this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (10)

1. a fingerprint identification method, be applied to the mobile terminal that is provided with embedded security chip and trusted area module, it is characterized in that, the method comprises:
When receiving the instruction of fingerprint recognition, described embedded security chip is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to described fingerprint image, obtains fingerprint characteristic;
Described fingerprint characteristic is sent to the microprocessor of described embedded security chip, makes the microprocessor of described embedded security chip carry out data processing to described fingerprint characteristic and carry out fingerprint recognition, obtain fingerprint recognition result;
Make described embedded security chip that described fingerprint recognition result is sent to described trusted area module;
Make described trusted area module carry out digital signature to described fingerprint recognition result, and the fingerprint recognition result after digital signature is sent to described mobile terminal, complete fingerprint recognition.
2. fingerprint identification method according to claim 1, is characterized in that, described when receiving the instruction of fingerprint recognition, before making the step of the fingerprint image of described embedded security chip acquisition active user input, also comprises:
When receiving user and storing the instruction of fingerprint template, described embedded security chip is made to obtain the fingerprint image for storing of this user input;
Make the microprocessor of described embedded security chip carry out data processing to the fingerprint image obtained, obtain the fingerprint template of this user and preserve.
3. fingerprint identification method according to claim 2, is characterized in that, described in make the microprocessor of described embedded security chip carry out data processing to the fingerprint image of described acquisition, obtain this user fingerprint template and preserve step specifically comprise:
The microprocessor of described embedded security chip being encrypted the described fingerprint image for storing according to built-in algorithm, obtaining fingerprint template and preserving.
4. fingerprint identification method according to claim 3, is characterized in that, described in make the microprocessor of described embedded security chip carry out data processing to described fingerprint characteristic and carry out fingerprint recognition, the step obtaining fingerprint recognition result specifically comprises:
The microprocessor of described embedded security chip is encrypted described fingerprint characteristic according to described built-in algorithm, obtains cryptographic fingerprint information;
Recognition rule according to presetting in described embedded security chip identifies described cryptographic fingerprint information and described fingerprint template, obtains fingerprint recognition result.
5. fingerprint identification method according to claim 4, it is characterized in that, the described recognition rule according to presetting in described embedded security chip identifies described cryptographic fingerprint information and described fingerprint template, and the step obtaining fingerprint recognition result specifically comprises:
Obtain the similarity discriminant value in described default recognition rule, and contrast the similarity of described cryptographic fingerprint information and described fingerprint template:
If the similarity of described cryptographic fingerprint information and described fingerprint template is more than or equal to described similarity discriminant value, generate correct fingerprint recognition result;
If the similarity of described cryptographic fingerprint information and described fingerprint template is less than described similarity discriminant value, the fingerprint recognition result of generation error.
6. a mobile terminal, is characterized in that, described mobile terminal includes embedded security chip and trusted area module, and described mobile terminal also comprises:
Acquisition module, for when receiving the instruction of fingerprint recognition, makes described embedded security chip obtain the fingerprint image of active user's input;
Characteristic extracting module, for carrying out feature extraction to described fingerprint image, obtains fingerprint characteristic;
Identification module, for described fingerprint characteristic being sent to the microprocessor of described embedded security chip, making the microprocessor of described embedded security chip carry out data processing to described fingerprint characteristic and carry out fingerprint recognition, obtaining fingerprint recognition result;
Sending module, is sent to described trusted area module for making described embedded security chip by described fingerprint recognition result;
Signature blocks, for making described trusted area module carry out digital signature to described fingerprint recognition result, and being sent to described mobile terminal by the fingerprint recognition result after digital signature, completing fingerprint recognition.
7. mobile terminal according to claim 6, is characterized in that, described mobile terminal also comprises:
Template acquisition module, for when described acquisition module receives the instruction of fingerprint recognition, before making the fingerprint image of described embedded security chip acquisition active user input,
When receiving user and storing the instruction of fingerprint template, described embedded security chip is made to obtain the fingerprint image for storing of this user input;
Template preserves module, for making the microprocessor of described embedded security chip carry out data processing to the fingerprint image of described acquisition, obtaining the fingerprint template of this user and preserving.
8. mobile terminal according to claim 7, is characterized in that, described template preserve module specifically for:
The microprocessor of described embedded security chip being encrypted the described fingerprint image for storing according to built-in algorithm, obtaining fingerprint template and preserving.
9. mobile terminal according to claim 8, is characterized in that, described identification module comprises:
Encryption submodule, for making the microprocessor of described embedded security chip be encrypted described fingerprint characteristic according to described built-in algorithm, obtains cryptographic fingerprint information;
Fingerprint recognition submodule, for identifying described cryptographic fingerprint information and described fingerprint template according to the recognition rule preset in described embedded security chip, obtains fingerprint recognition result.
10. mobile terminal according to claim 9, is characterized in that, described fingerprint recognition submodule specifically for:
Obtain the similarity discriminant value in described default recognition rule, and contrast the similarity of described cryptographic fingerprint information and described fingerprint template:
If the similarity of described cryptographic fingerprint information and described fingerprint template is more than or equal to described similarity discriminant value, generate correct fingerprint recognition result;
If the similarity of described cryptographic fingerprint information and described fingerprint template is less than described similarity discriminant value, the fingerprint recognition result of generation error.
CN201510705895.3A 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal Active CN105354466B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510705895.3A CN105354466B (en) 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510705895.3A CN105354466B (en) 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal

Publications (2)

Publication Number Publication Date
CN105354466A true CN105354466A (en) 2016-02-24
CN105354466B CN105354466B (en) 2017-03-29

Family

ID=55330437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510705895.3A Active CN105354466B (en) 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105354466B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975837A (en) * 2016-06-12 2016-09-28 北京集创北方科技股份有限公司 Biological feature recognition device and method and biological feature template registration method
CN106886699A (en) * 2017-01-20 2017-06-23 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN106897595A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of mobile terminal
CN106897596A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN106909820A (en) * 2017-01-20 2017-06-30 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its finger print data treating method and apparatus
WO2017215534A1 (en) * 2016-06-12 2017-12-21 北京集创北方科技股份有限公司 Secure chip, biological feature identification method, and biological feature template registration method
CN108563934A (en) * 2018-03-09 2018-09-21 青岛海信移动通信技术股份有限公司 A kind of method and device of unlocked by fingerprint
CN109101808A (en) * 2018-10-29 2018-12-28 广东长实通信科技有限公司 A kind of communication encryption apparatus and system of high security
CN109214236A (en) * 2017-06-29 2019-01-15 上海荆虹电子科技有限公司 The image sensor chip and terminal device of the double-deck embedded bio recognizer
CN109214234A (en) * 2017-06-29 2019-01-15 上海荆虹电子科技有限公司 The image sensor chip and terminal device of multilayer embedded bio-identification algorithm
CN109284639A (en) * 2017-07-21 2019-01-29 深圳如探索科技有限公司 Data processing method, device and equipment
CN110235141A (en) * 2019-04-29 2019-09-13 深圳市汇顶科技股份有限公司 Biological feather recognition method and electronic equipment
CN110651268A (en) * 2017-05-23 2020-01-03 指纹卡有限公司 Method and electronic equipment for authenticating user

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2609069Y (en) * 2002-04-03 2004-03-31 杭州中正生物认证技术有限公司 Fingerprint digital autograph device
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN1971575A (en) * 2006-11-24 2007-05-30 深圳兆日技术有限公司 An identity control method based on credibility platform module and fingerprint identifying
CN202854880U (en) * 2012-09-26 2013-04-03 深圳市亚略特生物识别科技有限公司 SMS payment system based on fingerprint identification mobile phone
CN103544599A (en) * 2012-07-09 2014-01-29 马克西姆综合产品公司 Embedded secure element for authentication, storage and transaction within a mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2609069Y (en) * 2002-04-03 2004-03-31 杭州中正生物认证技术有限公司 Fingerprint digital autograph device
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN1971575A (en) * 2006-11-24 2007-05-30 深圳兆日技术有限公司 An identity control method based on credibility platform module and fingerprint identifying
CN103544599A (en) * 2012-07-09 2014-01-29 马克西姆综合产品公司 Embedded secure element for authentication, storage and transaction within a mobile terminal
CN202854880U (en) * 2012-09-26 2013-04-03 深圳市亚略特生物识别科技有限公司 SMS payment system based on fingerprint identification mobile phone

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017215534A1 (en) * 2016-06-12 2017-12-21 北京集创北方科技股份有限公司 Secure chip, biological feature identification method, and biological feature template registration method
CN105975837A (en) * 2016-06-12 2016-09-28 北京集创北方科技股份有限公司 Biological feature recognition device and method and biological feature template registration method
CN106897596B (en) * 2017-01-20 2020-06-19 北京安云世纪科技有限公司 Fingerprint verification method and related equipment
CN106886699A (en) * 2017-01-20 2017-06-23 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN106909820A (en) * 2017-01-20 2017-06-30 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its finger print data treating method and apparatus
CN106897595A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of mobile terminal
CN106909820B (en) * 2017-01-20 2020-07-28 奇酷互联网络科技(深圳)有限公司 Mobile terminal and fingerprint data processing method and device thereof
CN106897596A (en) * 2017-01-20 2017-06-27 北京奇虎科技有限公司 A kind of fingerprint authentication method and relevant device
CN106886699B (en) * 2017-01-20 2020-06-19 北京安云世纪科技有限公司 Fingerprint verification method and related equipment
CN106897595B (en) * 2017-01-20 2020-04-03 北京安云世纪科技有限公司 Mobile terminal
CN110651268A (en) * 2017-05-23 2020-01-03 指纹卡有限公司 Method and electronic equipment for authenticating user
CN110651268B (en) * 2017-05-23 2023-10-17 指纹卡安娜卡敦知识产权有限公司 Method for authenticating user and electronic equipment
CN109214234B (en) * 2017-06-29 2024-06-07 深圳荆虹科技有限公司 Image sensor chip and terminal equipment of multilayer embedded biological recognition algorithm
CN109214234A (en) * 2017-06-29 2019-01-15 上海荆虹电子科技有限公司 The image sensor chip and terminal device of multilayer embedded bio-identification algorithm
CN109214236A (en) * 2017-06-29 2019-01-15 上海荆虹电子科技有限公司 The image sensor chip and terminal device of the double-deck embedded bio recognizer
CN109214236B (en) * 2017-06-29 2024-05-07 深圳荆虹科技有限公司 Image sensor chip and terminal equipment of double-layer embedded biological recognition algorithm
CN109284639A (en) * 2017-07-21 2019-01-29 深圳如探索科技有限公司 Data processing method, device and equipment
CN108563934B (en) * 2018-03-09 2020-07-10 青岛海信移动通信技术股份有限公司 Fingerprint unlocking method and device
CN108563934A (en) * 2018-03-09 2018-09-21 青岛海信移动通信技术股份有限公司 A kind of method and device of unlocked by fingerprint
CN109101808A (en) * 2018-10-29 2018-12-28 广东长实通信科技有限公司 A kind of communication encryption apparatus and system of high security
CN110235141A (en) * 2019-04-29 2019-09-13 深圳市汇顶科技股份有限公司 Biological feather recognition method and electronic equipment

Also Published As

Publication number Publication date
CN105354466B (en) 2017-03-29

Similar Documents

Publication Publication Date Title
CN105354466A (en) Fingerprint recognition method and mobile terminal
US9819676B2 (en) Biometric capture for unauthorized user identification
CN106126077B (en) Display control method of application program icons and mobile terminal
US20140007223A1 (en) Biometric Capture for Unauthorized User Identification
AU2022204797B2 (en) Raw sensor input encryption for passcode entry security
US20140201831A1 (en) Method and apparatus for authenticating password of user terminal
CN105956431B (en) A kind of application protection processing method and mobile terminal
CN106445392A (en) Operating method of status bar icon and mobile terminal
CN107450773B (en) False touch prevention method, terminal and computer readable storage medium
CN104375836A (en) Method and device for showing lock screen window
CN106557259B (en) A kind of operating method and mobile terminal of mobile terminal
CN105827816A (en) Screen splitting method for terminal screen, and mobile terminal
US20160180184A1 (en) Far-Field Sensing for Rotation of Finger
CN106127003A (en) A kind of fingerprint recognition unlocking method and mobile terminal
CN106203061A (en) The encryption method of a kind of application program and mobile terminal
CN106250757B (en) A kind of control method and mobile terminal of application program
CN104917607A (en) PIN encryption equipment of touch screen key-press input and encryption method
CN106156600B (en) A kind of unlocking method and mobile terminal of application program
CN107103224A (en) A kind of unlocking method and mobile terminal
CN106991306B (en) A kind of method and mobile terminal inputting password
CN107506198A (en) The display methods and mobile terminal of a kind of mobile terminal
CN106384060A (en) Mobile terminal data encryption method and mobile terminal
WO2017100135A1 (en) Interception of touch pad events for handling in a secure environment
CN106778344B (en) A kind of data permission control method and terminal
CN106648370A (en) Encrypting method for screenshots and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180514

Address after: 518101 21 building, customs building, 23 District, Baoan District Xin'an street, Shenzhen, Guangdong.

Patentee after: Weaver mobile communications (Shenzhen) Co., Ltd.

Address before: 523860 No. 283 BBK Avenue, Changan Town, Changan, Guangdong.

Patentee before: VIVO MOBILE COMMUNICATION CO., LTD.