CN105354466B - A kind of fingerprint identification method and mobile terminal - Google Patents

A kind of fingerprint identification method and mobile terminal Download PDF

Info

Publication number
CN105354466B
CN105354466B CN201510705895.3A CN201510705895A CN105354466B CN 105354466 B CN105354466 B CN 105354466B CN 201510705895 A CN201510705895 A CN 201510705895A CN 105354466 B CN105354466 B CN 105354466B
Authority
CN
China
Prior art keywords
fingerprint
security chip
embedded security
fingerprint recognition
recognition result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510705895.3A
Other languages
Chinese (zh)
Other versions
CN105354466A (en
Inventor
廖兴保
雷钊
唐纯杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weaver mobile communications (Shenzhen) Co., Ltd.
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201510705895.3A priority Critical patent/CN105354466B/en
Publication of CN105354466A publication Critical patent/CN105354466A/en
Application granted granted Critical
Publication of CN105354466B publication Critical patent/CN105354466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Abstract

The invention provides a kind of fingerprint identification method and mobile terminal, the method is applied to a mobile terminal for being provided with embedded security chip and trusted area module, and the method includes:When the instruction of fingerprint recognition is received, embedded security chip is made to obtain the fingerprint image of active user's input;Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;The fingerprint characteristic is sent to the microprocessor of the embedded security chip, make the microprocessor of the embedded security chip that data processing is carried out to the fingerprint characteristic and fingerprint recognition is carried out, obtain fingerprint recognition result;The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module;Make the trusted area module be digitally signed the fingerprint recognition result, and will be digitally signed after fingerprint recognition result send to the mobile terminal, complete fingerprint recognition.The present invention improves fingerprint payment safety, it is to avoid fingerprint identification process is maliciously tampered.

Description

A kind of fingerprint identification method and mobile terminal
Technical field
The present invention relates to the communications field, and more particularly, to a kind of fingerprint identification method and mobile terminal.
Background technology
With the fast development of mobile Internet, mobile payment is bright as the trend of the pith of payment technical field It is bright.Under the promotion of mobile payment tide, the quick emergence of mobile payment not only brings facility to consumer, also leaves phase The potential safety hazard answered, wherein, safety of payment undoubtedly becomes everybody one of concern the most.
Fingerprint pays a kind of mode of the identification identity as mobile payment, has in mobile payment field and widely should With.The technological core that fingerprint pays is fingerprint identification technology, and fingerprint recognition belongs to biological identification technology, because of its not transreplication, nothing The characteristic such as need to worry to lose or pass into silence, possess the safe class higher than ordinary password.
At present, some intelligent terminal, typically pass through pure software or in one hardware trusted context of intelligent terminal's internal build Two ways is carrying out fingerprint recognition.Due to the opening of operating system, the encrypting fingerprint mode of pure software is difficult to resist and calculates The attack of machine virus;And hardware trusted context mode runs a Mach as embedded safety system, to intelligence The hardware modifications very little of energy terminal system, low cost can meet certain demand for security, but be only capable of providing appropriate safety, it is impossible to Ensure that the related data interaction outside hardware trusted context by malicious attack or is not distorted, it is impossible to meet big amount and pay need Ask.
The content of the invention
The embodiment of the present invention provides a kind of fingerprint identification method and mobile terminal, to solve existing intelligent terminal by pure Software or in one hardware trusted context two ways of intelligent terminal's internal build carrying out fingerprint recognition, it is difficult to provide safety strong The high fingerprint of degree pays the problem for ensureing.
In a first aspect, The embodiment provides a kind of fingerprint identification method, is applied to one and is provided with embedded peace The mobile terminal of full chip and trusted area module, the method include:
When the instruction of fingerprint recognition is received, embedded security chip is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;
The fingerprint characteristic is sent to the microprocessor of the embedded security chip, make the embedded security chip Microprocessor data processing is carried out to the fingerprint characteristic and fingerprint recognition is carried out, obtain fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module;
Make the trusted area module be digitally signed the fingerprint recognition result, and will be digitally signed after Fingerprint recognition result is sent to the mobile terminal, completes fingerprint recognition.
On the other hand, embodiments of the invention additionally provide a kind of mobile terminal, and the mobile terminal includes embedded Safety chip and trusted area module, the mobile terminal also include:
Acquisition module, it is defeated for when the instruction of fingerprint recognition is received, making embedded security chip obtain active user The fingerprint image for entering;
Characteristic extracting module, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic;
Identification module, for sending the fingerprint characteristic to the microprocessor of the embedded security chip, makes described The microprocessor of embedded security chip carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition As a result;
Sending module, for making the embedded security chip fingerprint recognition result be sent to the trusted area Module;
Signature blocks, for making the trusted area module be digitally signed the fingerprint recognition result, and by Jing Fingerprint recognition result after digital signature is sent to the mobile terminal, completes fingerprint recognition.
So, the fingerprint identification method that the present invention is provided, on the one hand, special by the feature extraction and fingerprint that make fingerprint image The differentiation process levied cannot invade chip internal in embedded security chip internal operation, long-range attack, it is impossible to obtain or distort Fingerprint characteristic, comparison result etc., have fundamentally resisted long-range attack;On the other hand, embedded security chip will differentiate result Preservation is sent into trusted area module, due to the safety of itself of trusted area module, differentiates that result also will not be in module Inside it is maliciously tampered.The present invention by whole fingerprint identification process respectively in embedded security chip and trusted area module it is complete Into, by the combination of embedded security chip and trusted area module, while Consumer's Experience is not reduced, improve fingerprint The safety paid, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted, and protects the fund security of user.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be in embodiment or description of the prior art The required accompanying drawing for using is briefly described, it should be apparent that, drawings in the following description are only some realities of the present invention Example is applied, for those of ordinary skill in the art, without having to pay creative labor, can be with attached according to these Figure obtains other accompanying drawings.
Fig. 1 represents the basic step flow chart of the fingerprint identification method that the first embodiment of the present invention is provided;
Fig. 2 represents the basic step flow chart of the fingerprint identification method that the second embodiment of the present invention is provided;
Fig. 3 is the block diagram of the mobile terminal that third embodiment of the invention is provided;
Fig. 4 is the block diagram of the mobile terminal that fourth embodiment of the invention is provided;
Fig. 5 is the block diagram of the mobile terminal that fifth embodiment of the invention is provided;
Fig. 6 is the block diagram of the mobile terminal that fifth embodiment of the invention is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art Example, belongs to the scope of protection of the invention.
First embodiment
The first embodiment of the present invention provides a kind of fingerprint identification method, is applied to one and is provided with embedded security chip With the mobile terminal of trusted area module, fingerprint is obtained by embedded security chip first and fingerprint differentiation is carried out, then will be sentenced Other result is sent to trusted area module, trusted area module is retransmited after being digitally signed to movement eventually to differentiating result End.
Specifically, referring to Fig. 1, the first embodiment of the present invention provides a kind of fingerprint identification method, and the method includes:
Step 101, when the instruction of fingerprint recognition is received, makes embedded security chip obtain the finger of active user's input Print image.
Wherein, the acquisition of fingerprint image is carried out inside embedded security chip, and long-range attack cannot invade chip internal, Cannot obtain or distort fingerprint characteristic.
Step 102, carries out feature extraction to fingerprint image, obtains fingerprint characteristic.
In the embodiment of the present invention, fingerprint image is not directly stored in fingerprint identification technology, but is carried in fingerprint image The feature of fetching print image.Fingerprint characteristic includes expanding spectrum signature of type feature and fingerprint of fingerprint etc..
Step 103, fingerprint characteristic is sent to the microprocessor of embedded security chip, makes the micro- of embedded security chip Processor carries out data processing and carries out fingerprint recognition to fingerprint characteristic, obtains fingerprint recognition result.
In the embodiment of the present invention, fingerprint identification process cannot be invaded in embedded security chip internal operation, long-range attack Chip internal, it is impossible to obtain or distort comparison result, has fundamentally resisted long-range attack.
Step 104, makes embedded security chip fingerprint recognition result be sent to trusted area module.
In the embodiment of the present invention, trusted area module (TrustZone) is a part for mobile terminal hardware configuration, with shifting The operating system of dynamic terminal is mutually isolated, is the security system of an isolated operation.Trusted area module itself has safety, Differentiate that result will not be maliciously tampered in module.
Step 105, makes trusted area module be digitally signed fingerprint recognition result, and will be digitally signed after Fingerprint recognition result is sent to mobile terminal, completes fingerprint recognition.
Specifically, digital signature is just attached to some data in data cell, or data cell is done it is close Code conversion, this data or cryptographic transformation allow the recipient of data cell to confirm source and the data cell of data cell Integrity and protect data, prevent from maliciously being forged.It is a kind of method that the message to electronic form is signed, one Signature information can be transmitted in a communication network;Briefly, digital signature is a kind of method for differentiating digital information, Only the sender of information could produce, the data that others cannot forge, these data are also simultaneously the sender to information Send a valid certificates of information authenticity.
In the embodiment of the present invention, trusted area module to differentiate result be digitally signed, and will be digitally signed after Fingerprint recognition result send to mobile terminal, complete fingerprint recognition.Other programs cannot forge the digital signature, it is impossible to malice Distort differentiation result.
In the above embodiment of the present invention, after obtaining fingerprint image to be identified, after carrying out feature extraction, send to embedded The microprocessor of formula safety chip, completes differentiation process in embedded security chip, and will directly differentiate that result is sent to can Letter regions module.As the feature extraction of fingerprint image and the differentiation process of fingerprint characteristic are all transported inside embedded security chip OK, long-range attack cannot invade chip internal, it is impossible to obtain or distort fingerprint characteristic, comparison result etc., fundamentally resist Long-range attack;On the other hand, in embodiments of the invention, embedded security chip will differentiate that result is sent to trusted area module Middle preservation, due to the safety of itself of trusted area module, differentiates that result also will not be maliciously tampered in module.
In the above embodiment of the present invention, by whole fingerprint identification process respectively in embedded security chip and trusted area Complete in module, by the combination of embedded security chip and trusted area module, while Consumer's Experience is not reduced, improve The safety that fingerprint pays, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted, and protects the money of user Golden safety.
Before step 101, further include:
When receive user store fingerprint template instruction when, make embedded security chip obtain the user input be intended to deposit The fingerprint image of storage;
Make the microprocessor of embedded security chip data processing be carried out to the fingerprint image for obtaining, obtain the finger of the user Stricture of vagina template is simultaneously preserved.
Wherein, the built-in key of embedded security chip is write by disposable fusing when chip dispatches from the factory, it is impossible to from outer Portion reads and writes and changes, therefore, external program cannot obtain the built-in key of embedded security chip, it is impossible to be gone out according to key recovery Fingerprint template.
Further, the fingerprint image to obtaining carries out data processing, obtains the fingerprint template of the user and preserves, specifically Including:
Fingerprint image of the microprocessor of embedded security chip according to built-in algorithm to be stored is made to be encrypted place Reason, obtains fingerprint template and preserves.
In the above embodiment of the present invention, when the instruction of storage fingerprint template is received, the fingerprint image to be stored is obtained Picture, and the fingerprint image to be stored is encrypted according to built-in algorithm by microprocessor, obtain fingerprint template simultaneously Preserve.As external program cannot restore fingerprint template by breaking cryptographic keys, therefore, in the above embodiment of the present invention, refer to The preservation safety of stricture of vagina template is higher, and external program cannot distort fingerprint recognition result by reducing fingerprint template.
Second embodiment
As shown in Fig. 2 the second embodiment of the present invention provide a kind of fingerprint identification method, be applied to one be provided with it is embedded The mobile terminal of formula safety chip and trusted area module, the method include:
Step 201, when the instruction of fingerprint recognition is received, the fingerprint image for obtaining active user's input makes embedded peace Full chip obtains the fingerprint image of active user's input.
In the step, the acquisition of fingerprint image is carried out inside embedded security chip, and long-range attack cannot invade chip It is internal, it is impossible to obtain or distort fingerprint characteristic.
Step 202, carries out feature extraction to fingerprint image, obtains fingerprint characteristic.
In the embodiment of the present invention, fingerprint image is not directly stored in fingerprint identification technology, but is carried in fingerprint image The feature of fetching print image.Fingerprint characteristic includes expanding spectrum signature of type feature and fingerprint of fingerprint etc..
Step 203, makes the microprocessor of embedded security chip that place is encrypted to fingerprint characteristic according to built-in algorithm Reason, obtains cryptographic fingerprint information.
Wherein, the microprocessor of embedded security chip is encrypted to fingerprint characteristic according to built-in algorithm first, by The key of embedded security chip cannot be cracked in external program, therefore malice cannot be carried out to fingerprint characteristic and be distorted.
Step 204, enters to cryptographic fingerprint information and fingerprint template according to default recognition rule in embedded security chip Row identification, obtains fingerprint recognition result.
Wherein, cryptographic fingerprint information and fingerprint template are identified, draw recognition result, whole process is in embedded core Piece internal operation, data will not be intercepted and captured or be distorted by external program.
Step 205, makes embedded security chip fingerprint recognition result be sent to trusted area module.
In the embodiment of the present invention, trusted area module (TrustZone) is a part for mobile terminal hardware configuration, with shifting The operating system of dynamic terminal is mutually isolated, is the security system of an isolated operation.Trusted area module itself has safety, Differentiate that result will not be maliciously tampered in module.
Step 206, makes trusted area module be digitally signed fingerprint recognition result, and will be digitally signed after Fingerprint recognition result is sent to mobile terminal, completes fingerprint recognition.
Specifically, digital signature is just attached to some data in data cell, or data cell is done it is close Code conversion, this data or cryptographic transformation allow the recipient of data cell to confirm source and the data cell of data cell Integrity and protect data, prevent from maliciously being forged.It is a kind of method that the message to electronic form is signed, one Signature information can be transmitted in a communication network;Briefly, digital signature is a kind of method for differentiating digital information, Only the sender of information could produce, the data that others cannot forge, these data are also simultaneously the sender to information Send a valid certificates of information authenticity.
In the embodiment of the present invention, trusted area module is digitally signed to fingerprint recognition result, and will be digitally signed Fingerprint recognition result afterwards is sent to mobile terminal, completes fingerprint recognition, and other programs cannot forge the digital signature, it is impossible to Malice distorts differentiation result.
Further, step 204 is specifically included:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied Really.
In the above embodiment of the present invention, the microprocessor of embedded security chip is first according to built-in algorithm to fingerprint Feature is encrypted, then cryptographic fingerprint information and fingerprint template are identified, and draws recognition result, and whole process is embedded Chip internal runs, and data will not be intercepted and captured or be distorted by external program, and external program cannot be distorted by attacking differentiation process Recognition result.In the above embodiment of the present invention, fingerprint recognition is improved by the safety curtain of increase fingerprint differentiation process Safety, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted, and protects the fund security of user.
3rd embodiment
The above first embodiment of the present invention to second embodiment introduction be the present invention provide fingerprint recognition method Content, be described below the fourth embodiment of the present invention offer mobile terminal.
Referring to Fig. 3, Fig. 3 is the block diagram of the mobile terminal that third embodiment of the invention is provided.Mobile terminal shown in Fig. 3 300 include:Acquisition module 301, characteristic extracting module 302, identification module 303, sending module 304 and signature blocks 305.
Acquisition module 301, for when the instruction of fingerprint recognition is received, making embedded security chip obtain active user The fingerprint image of input;
Wherein, the acquisition of fingerprint image is carried out inside embedded security chip, and long-range attack cannot invade chip internal, Cannot obtain or distort fingerprint characteristic.
Characteristic extracting module 302, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic.
Identification module 303, for sending fingerprint characteristic to the microprocessor of embedded security chip, makes embedded-type security The microprocessor of chip carries out data processing and carries out fingerprint recognition to fingerprint characteristic, obtains fingerprint recognition result.
Wherein, in embedded security chip internal operation, long-range attack cannot invade chip internal, nothing to fingerprint identification process Method is obtained or distorts comparison result, has fundamentally resisted long-range attack.
Sending module 304, for making embedded security chip fingerprint recognition result be sent to trusted area module.
Signature blocks 305, for making trusted area module be digitally signed fingerprint recognition result, and Jing numerals are signed Fingerprint recognition result after name is sent to mobile terminal, completes fingerprint recognition.
Wherein, trusted area module is digitally signed to differentiating result, and other programs cannot be forged the numeral and be signed Name, it is impossible to maliciously distort differentiation result.
The mobile terminal that the above embodiment of the present invention is provided, by whole fingerprint identification process respectively in embedded-type security core Complete in piece and trusted area module, by the combination of embedded security chip and trusted area module, do not reducing user's body While testing, the safety of fingerprint payment is improve, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted, The fund security of protection user.
Fourth embodiment
On the basis of Fig. 3, alternatively, mobile terminal 300 also includes:Template acquisition module and template preserving module, Identification module 303 includes:Encryption submodule and fingerprint recognition submodule, referring to Fig. 4, Fig. 4 is that fourth embodiment of the invention is carried For mobile terminal block diagram, the mobile terminal 400 shown in Fig. 4 includes:Acquisition module 401, characteristic extracting module 402, identification Module 403, encryption submodule 4031, fingerprint recognition submodule 4032, sending module 304, signature blocks 405, template obtain mould Block 406 and template preserving module 407:
Acquisition module 401, for when the instruction of fingerprint recognition is received, making embedded security chip obtain active user The fingerprint image of input.
Characteristic extracting module 402, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic.
Identification module 403, for sending fingerprint characteristic to the microprocessor of embedded security chip, makes embedded-type security The microprocessor of chip carries out data processing and carries out fingerprint recognition to fingerprint characteristic, obtains fingerprint recognition result.
Wherein, identification module 403 includes encrypting submodule 4031 and fingerprint recognition submodule 4032.
Encryption submodule 4031, for making the microprocessor of embedded security chip according to built-in algorithm to fingerprint characteristic It is encrypted, obtains cryptographic fingerprint information.
Fingerprint recognition submodule 4032, for being believed to cryptographic fingerprint according to default recognition rule in embedded security chip Breath is identified with fingerprint template, obtains fingerprint recognition result.
Wherein, the microprocessor of embedded security chip is encrypted to fingerprint characteristic according to built-in algorithm first, by The key of embedded security chip cannot be cracked in external program, therefore malice cannot be carried out to fingerprint characteristic and be distorted.
Alternatively, fingerprint recognition submodule 4032 specifically for:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied Really.
Sending module 404, for making embedded security chip fingerprint recognition result be sent to trusted area module;
Signature blocks 405, for making trusted area module be digitally signed fingerprint recognition result, and Jing numerals are signed Fingerprint recognition result after name is sent to mobile terminal, completes fingerprint recognition.
Template acquisition module 406, for receiving in acquisition module 401 during the instruction of fingerprint recognition, makes embedded-type security Before chip obtains the fingerprint image of active user's input,
When receive user store fingerprint template instruction when, make embedded security chip obtain the user input be intended to deposit The fingerprint image of storage;
Template preserving module 407, for making the microprocessor of embedded security chip enter line number to the fingerprint image for obtaining According to process, obtain the fingerprint template of the user and preserve.
Wherein, the built-in key of embedded security chip is write by disposable fusing when chip dispatches from the factory, it is impossible to from outer Portion reads and writes and changes, therefore, external program cannot obtain the built-in key of embedded security chip, it is impossible to be gone out according to key recovery Fingerprint template.
Alternatively, template preserving module 407 specifically for:
The microprocessor of the embedded security chip is made to be entered to the fingerprint image to be stored according to built-in algorithm Row encryption, obtains fingerprint template and preserves.
The mobile terminal that the above embodiment of the present invention is provided, when the instruction of storage fingerprint template is received, obtains and is intended to The fingerprint image of storage, and the fingerprint image to be stored is encrypted according to built-in algorithm by microprocessor, obtain To fingerprint template and preserve.As external program cannot restore fingerprint template by breaking cryptographic keys, therefore, the present invention's is above-mentioned In the mobile terminal that embodiment is provided, the preservation safety of fingerprint template is higher, and external program cannot be by reducing fingerprint template To distort fingerprint recognition result.
It is each that mobile terminal in above-described embodiment can realize that mobile terminal in the embodiment of the method for Fig. 1 to Fig. 2 is realized Individual process, to avoid repeating, is repeated no more here.In the mobile terminal that the above embodiment of the present invention is provided, embedded-type security The microprocessor of chip is encrypted to fingerprint characteristic according to built-in algorithm first, then by cryptographic fingerprint information and fingerprint template It is identified, draws recognition result, whole process will not be intercepted and captured or be usurped by external program in embedded chip internal operation, data Change, external program cannot be by attacking differentiation process come tamper Detection result.
5th embodiment
Fig. 5 is the block diagram of the mobile terminal of fifth embodiment of the invention.Mobile terminal 500 shown in Fig. 5 includes:At least one Individual processor 501, memorizer 502, at least one network interface 504, other users interface 503, embedded security chip 506 with And trusted area module 507.Each component in mobile terminal 500 is coupled by bus system 505.It is understood that total Linear system system 505 is used to realize the connection communication between these components.Bus system 505 also includes in addition to including data/address bus Power bus, controlling bus and status signal bus in addition.But for the sake of for clear explanation, in Figure 5 various buses are all designated as Bus system 505.
Wherein, user interface 503 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memorizer 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and which is used as outside height Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double DataRate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory (DirectRambusRAM, DRRAM).The memorizer 502 of system and method described herein be intended to including but not limited to these and The memorizer of any other suitable type.
In some embodiments, memorizer 502 stores following element, can perform module or data structure, or Person their subset, or their superset:Operating system 5021 and application program 5022.
Wherein, operating system 5021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 5022, comprising various application programs, such as media Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side The program of method is may be embodied in application program 5022.
Wherein, enter row data communication between embedded security chip 506 and processor 501 and trusted area module 507, 506 built-in key of embedded security chip, and write by disposable fusing when chip dispatches from the factory, it is impossible to from exterior read-write and repair Change, therefore, external program cannot crack the built-in key of embedded security chip 506.
Wherein, trusted area module 507 is a part for 500 hardware configuration of mobile terminal, with embedded security chip 506 And between mobile terminal 500, enter row data communication, and it is mutually isolated with the operating system of mobile terminal 500, it is one independent The security system of operation.Trusted area module 507 itself has safety, and the data of storage inside will not be in module by malice Distort.
In embodiments of the present invention, by call memorizer 502 storage program or instruction, specifically, can be application The program stored in program 5022 or instruction, processor 501 are used for:
When the instruction of fingerprint recognition is received, embedded security chip 506 is made to obtain the fingerprint image of active user's input Picture;
Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;
Fingerprint characteristic is sent to the microprocessor of the embedded security chip 506, make the embedded security chip 506 microprocessor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module trusted area Module 507;
Be digitally signed the fingerprint recognition result of the trusted area module 507 pairs, and by it is digitally signed it Fingerprint recognition result afterwards is sent to the mobile terminal, completes fingerprint recognition.
The method that the embodiments of the present invention are disclosed is can apply in processor 501, or is realized by processor 501. A kind of possibly IC chip of processor 501, the disposal ability with signal.During realization, said method it is each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 501 or software form.Above-mentioned process Device 501 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and logic diagram.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to embodiment of the present invention institute The step of disclosed method, can be embodied directly in hardware decoding processor and perform and complete, or with the hardware in decoding processor And software module combination execution is completed.Software module may be located at random access memory, and flash memory, read only memory may be programmed read-only In the ripe storage medium in this area such as memorizer or electrically erasable programmable memory, depositor.The storage medium is located at Memorizer 502, processor 501 read the information in memorizer 502, the step of complete said method with reference to its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine to realize.For hardware is realized, processing unit can be realized in one or more special ICs (Application Specific Integrated Circuit, ASIC), digital signal processor (Digital Signal Processor, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable LogicDevice, PLD), field programmable gate array (Field Programmable Gate Array, FPGA), general place In reason device, controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
For software is realized, can be realized herein by the module (such as process, function etc.) of execution function described herein Described technology.During software code is storable in memorizer and by computing device.Memorizer can within a processor or Realize outside processor.
Alternatively, processor 501 is additionally operable to:When the instruction of fingerprint recognition is received, obtain embedded security chip 506 Before taking the fingerprint image of active user's input:
When the instruction of user's storage fingerprint template is received, embedded security chip 506 is made to obtain the user input The fingerprint image to be stored;
Make the microprocessor of embedded security chip 506 data processing be carried out to the fingerprint image for obtaining, obtain the user Fingerprint template and preserve.
Alternatively, as another embodiment, processor 501 is additionally operable to:
It is encrypted fingerprint image of the microprocessor of embedded security chip 506 according to built-in algorithm to be stored Process, obtain fingerprint template and preserve.Alternatively, as another embodiment, processor 501 makes embedded security chip 506 Microprocessor fingerprint characteristic is encrypted according to built-in algorithm, obtain cryptographic fingerprint information;
Cryptographic fingerprint information and fingerprint template are known according to default recognition rule in embedded security chip 506 Not, obtain fingerprint recognition result.Alternatively, as another embodiment, processor 501 is additionally operable to:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied Really.Mobile terminal 500 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here no longer Repeat.
The mobile terminal provided in the above embodiment of the present invention, by detecting to pattern edge, when touching for user When touching the marginal position of object on operation and screen and partially overlapping, generate fingerprint recognition signal and simultaneously start feedback effectss, use Family produces a kind of dragging by touch operation and feels, and gives user more real experience.
Sixth embodiment
Fig. 6 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 6 600 can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA), or vehicle mounted electric Brain etc..
Mobile terminal 600 in Fig. 6 includes that radio frequency (RadioFrequency, RF) circuit 610, memorizer 620, input are single Unit 630, display unit 640, processor 660, voicefrequency circuit 670, WiFi (Wireless Fidelity) module 680, power supply 690th, embedded security chip 6100 and trusted area module 6200.
Wherein, input block 630 can be used for the numeral or character information of receiving user's input, and produce and mobile terminal The signal input that 600 user is arranged and function control is relevant.Specifically, in the embodiment of the present invention, the input block 630 can With including contact panel 631.Contact panel 631, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user is using the operation of any suitable object or adnexa on contact panel 631 such as finger, stylus), and according to advance The formula of setting drives corresponding attachment means.Optionally, contact panel 631 may include touch detecting apparatus and touch controller Two parts.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation brings is detected, by signal Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, Give the processor 660 again, and the order sent of receiving processor 660 can be performed.Furthermore, it is possible to adopt resistance-type, The polytypes such as condenser type, infrared ray and surface acoustic wave realize contact panel 631.Except contact panel 631, input block 630 can also include other input equipments 632, and other input equipments 632 can include but is not limited to physical keyboard, function key One or more in (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 640 can be used for display by the information of user input or be supplied to information and the movement of user The various menu interfaces of terminal 600.Display unit 640 may include display floater 641, optionally, can adopt LCD or organic The forms such as optical diode (Organic Light-Emitting Diode, OLED) are configuring display floater 641.
It should be noted that contact panel 631 can cover display floater 641, touch display screen is formed, when the touch display screen is examined Measure thereon or after neighbouring touch operation, processor 660 is sent to determine the type of touch event, with preprocessor 660 provide corresponding visual output in touch display screen according to the type of touch event.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can be distinguished two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area be used for show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein, processor 660 is the control centre of mobile terminal 600, using various interfaces and connection whole mobile phone Various pieces, be stored in software program and/or module in first memory 621 by running or performing, and call and deposit The data in second memory 622 are stored up, the various functions and processing data of mobile terminal 600 is performed, so as to mobile terminal 600 carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
Wherein, carry out data to lead between embedded security chip 6100 and processor 660 and trusted area module 6200 Letter, 6100 built-in key of embedded security chip, and write by disposable fusing when chip dispatches from the factory, it is impossible to from exterior read-write And modification, therefore, external program cannot crack the built-in key of embedded security chip 6100.
Wherein, trusted area module 6200 is a part for 600 hardware configuration of mobile terminal, with embedded security chip Enter row data communication between 6100, and it is mutually isolated with the operating system of mobile terminal 600, it is the safety body of an isolated operation System.The data that trusted area module 6200 itself has safety, storage inside will not be maliciously tampered in module.
In embodiments of the present invention, by call store the first memory 621 in software program and/or module and/ Or the data in the second memory 622, processor 660 is used for:
When the instruction of fingerprint recognition is received, embedded security chip 6100 is made to obtain the fingerprint image of active user's input Picture;
Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;
Fingerprint characteristic is sent to the microprocessor of the embedded security chip 6100, make the embedded security chip 6100 microprocessor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module 6200;
Be digitally signed the fingerprint recognition result of the trusted area module 6200 pairs, and by it is digitally signed it Fingerprint recognition result afterwards is sent to the mobile terminal, completes fingerprint recognition.
Alternatively, processor 660 is additionally operable to:When the instruction of fingerprint recognition is received, embedded security chip 6100 is made Before obtaining the fingerprint image of active user's input:
When the instruction of user's storage fingerprint template is received, embedded security chip 6100 is made to obtain the user input The fingerprint image to be stored;
Make the microprocessor of embedded security chip 6100 data processing be carried out to the fingerprint image for obtaining, obtain the user Fingerprint template and preserve.
Alternatively, as another embodiment, processor 660 is additionally operable to:
Fingerprint image of the microprocessor of embedded security chip 6100 according to built-in algorithm to be stored is made to carry out adding Close process, obtains fingerprint template and preserves.Alternatively, as another embodiment, processor 660 makes embedded security chip 6100 microprocessor is encrypted to fingerprint characteristic according to built-in algorithm, obtains cryptographic fingerprint information;
Cryptographic fingerprint information and fingerprint template are known according to default recognition rule in embedded security chip 6100 Not, obtain fingerprint recognition result.
Alternatively, as another embodiment, processor 660 is additionally operable to:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied Really.Mobile terminal 600 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here no longer Repeat.
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied Really.Mobile terminal 600 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here no longer Repeat.
It can be seen that, the mobile terminal provided in the above embodiment of the present invention, by detecting to pattern edge, works as user Touch operation and screen on the marginal position of object when partially overlapping, generate fingerprint recognition signal and simultaneously start feedback effectss, Make user a kind of dragging be produced by touch operation to feel, give user more real experience.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Each specific application can be used different methods to realize described function, but this realization it is not considered that exceeding The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the unit is only A kind of division of logic function, can have when actually realizing other dividing mode, such as multiple units or component can with reference to or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (10)

1. a kind of fingerprint identification method, is applied to a mobile terminal for being provided with embedded security chip and trusted area module, Characterized in that, the method includes:
When the instruction of fingerprint recognition is received, the embedded security chip is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to the fingerprint image, fingerprint characteristic is obtained;
The fingerprint characteristic is sent to the microprocessor of the embedded security chip, make the micro- of the embedded security chip Processor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module;
Make the trusted area module be digitally signed the fingerprint recognition result, and will be digitally signed after fingerprint Recognition result is sent to the mobile terminal, completes fingerprint recognition;
Wherein, it is described the step of make the trusted area module be digitally signed the fingerprint recognition result, including:Make institute State trusted area module and the fingerprint recognition result is added into preset data, or password change is carried out to the fingerprint recognition result Change, the preset data is to confirm source and the integrity of the fingerprint recognition result.
2. fingerprint identification method according to claim 1, it is characterised in that described when the instruction that receive fingerprint recognition When, the step of make the embedded security chip obtain the fingerprint image of active user's input before, also include:
When receive user store fingerprint template instruction when, make the embedded security chip obtain the user input be intended to deposit The fingerprint image of storage;
Make the microprocessor of the embedded security chip data processing be carried out to the fingerprint image for obtaining, obtain the finger of the user Stricture of vagina template is simultaneously preserved.
3. fingerprint identification method according to claim 2, it is characterised in that described to make the micro- of the embedded security chip Processor carries out data processing to the fingerprint image of the acquisition, obtains the fingerprint template of the user and specifically wraps the step of preservation Include:
The microprocessor of the embedded security chip is made to carry out adding to the fingerprint image to be stored according to built-in algorithm Close process, obtains fingerprint template and preserves.
4. fingerprint identification method according to claim 3, it is characterised in that described to make the micro- of the embedded security chip Processor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, specifically wraps the step of obtain fingerprint recognition result Include:
The microprocessor of the embedded security chip is made to be encrypted place to the fingerprint characteristic according to the built-in algorithm Reason, obtains cryptographic fingerprint information;
The cryptographic fingerprint information and the fingerprint template are entered according to default recognition rule in the embedded security chip Row identification, obtains fingerprint recognition result.
5. fingerprint identification method according to claim 4, it is characterised in that described according in the embedded security chip Default recognition rule is identified to the cryptographic fingerprint information and the fingerprint template, the step of obtain fingerprint recognition result Specifically include:
The similarity discriminant value in the default recognition rule is obtained, and the cryptographic fingerprint information is contrasted with the fingerprint mould The similarity of plate:
If the cryptographic fingerprint information is more than or equal to the similarity discriminant value with the similarity of the fingerprint template, generate correct Fingerprint recognition result;
If the cryptographic fingerprint information is less than the similarity discriminant value, the finger of generation error with the similarity of the fingerprint template Stricture of vagina recognition result.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes embedded security chip and trusted area module, The mobile terminal also includes:
Acquisition module, it is defeated for when the instruction of fingerprint recognition is received, making the embedded security chip obtain active user The fingerprint image for entering;
Characteristic extracting module, for carrying out feature extraction to the fingerprint image, obtains fingerprint characteristic;
Identification module, for sending the fingerprint characteristic to the microprocessor of the embedded security chip, makes described embedded The microprocessor of formula safety chip carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition knot Really;
Sending module, for making the embedded security chip fingerprint recognition result be sent to the trusted area mould Block;
Signature blocks are for making the trusted area module be digitally signed the fingerprint recognition result and Jing is digital Fingerprint recognition result after signature is sent to the mobile terminal, completes fingerprint recognition;
Wherein, the signature blocks specifically for:Make the trusted area module that the fingerprint recognition result is added present count According to, or cryptographic transformation is carried out to the fingerprint recognition result, the preset data is to confirm coming for the fingerprint recognition result Source and integrity.
7. mobile terminal according to claim 6, it is characterised in that the mobile terminal also includes:
Template acquisition module, for receiving in the acquisition module during instruction of fingerprint recognition, makes the embedded-type security core Before piece obtains the fingerprint image of active user's input,
When receive user store fingerprint template instruction when, make the embedded security chip obtain the user input be intended to deposit The fingerprint image of storage;
Template preserving module, for making the microprocessor of the embedded security chip enter line number to the fingerprint image of the acquisition According to process, obtain the fingerprint template of the user and preserve.
8. mobile terminal according to claim 7, it is characterised in that the template preserving module specifically for:
The microprocessor of the embedded security chip is made to carry out adding to the fingerprint image to be stored according to built-in algorithm Close process, obtains fingerprint template and preserves.
9. mobile terminal according to claim 8, it is characterised in that the identification module includes:
Encryption submodule, for making the microprocessor of the embedded security chip according to the built-in algorithm to the fingerprint Feature is encrypted, and obtains cryptographic fingerprint information;
Fingerprint recognition submodule, for being believed to the cryptographic fingerprint according to default recognition rule in the embedded security chip Breath is identified with the fingerprint template, obtains fingerprint recognition result.
10. mobile terminal according to claim 9, it is characterised in that the fingerprint recognition submodule specifically for:
The similarity discriminant value in the default recognition rule is obtained, and the cryptographic fingerprint information is contrasted with the fingerprint mould The similarity of plate:
If the cryptographic fingerprint information is more than or equal to the similarity discriminant value with the similarity of the fingerprint template, generate correct Fingerprint recognition result;
If the cryptographic fingerprint information is less than the similarity discriminant value, the finger of generation error with the similarity of the fingerprint template Stricture of vagina recognition result.
CN201510705895.3A 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal Active CN105354466B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510705895.3A CN105354466B (en) 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510705895.3A CN105354466B (en) 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal

Publications (2)

Publication Number Publication Date
CN105354466A CN105354466A (en) 2016-02-24
CN105354466B true CN105354466B (en) 2017-03-29

Family

ID=55330437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510705895.3A Active CN105354466B (en) 2015-10-26 2015-10-26 A kind of fingerprint identification method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105354466B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975837B (en) * 2016-06-12 2019-04-30 北京集创北方科技股份有限公司 Calculate equipment, biological feather recognition method and template register method
CN105975838A (en) * 2016-06-12 2016-09-28 北京集创北方科技股份有限公司 Secure chip, biological feature identification method and biological feature template registration method
CN106897596B (en) * 2017-01-20 2020-06-19 北京安云世纪科技有限公司 Fingerprint verification method and related equipment
CN106886699B (en) * 2017-01-20 2020-06-19 北京安云世纪科技有限公司 Fingerprint verification method and related equipment
CN106909820B (en) * 2017-01-20 2020-07-28 奇酷互联网络科技(深圳)有限公司 Mobile terminal and fingerprint data processing method and device thereof
CN106897595B (en) * 2017-01-20 2020-04-03 北京安云世纪科技有限公司 Mobile terminal
CN110651268B (en) * 2017-05-23 2023-10-17 指纹卡安娜卡敦知识产权有限公司 Method for authenticating user and electronic equipment
CN109214234A (en) * 2017-06-29 2019-01-15 上海荆虹电子科技有限公司 The image sensor chip and terminal device of multilayer embedded bio-identification algorithm
CN109214236A (en) * 2017-06-29 2019-01-15 上海荆虹电子科技有限公司 The image sensor chip and terminal device of the double-deck embedded bio recognizer
CN109284639A (en) * 2017-07-21 2019-01-29 深圳如探索科技有限公司 Data processing method, device and equipment
CN108563934B (en) * 2018-03-09 2020-07-10 青岛海信移动通信技术股份有限公司 Fingerprint unlocking method and device
CN109101808A (en) * 2018-10-29 2018-12-28 广东长实通信科技有限公司 A kind of communication encryption apparatus and system of high security
WO2020220213A1 (en) * 2019-04-29 2020-11-05 深圳市汇顶科技股份有限公司 Biological feature recognition method and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2609069Y (en) * 2002-04-03 2004-03-31 杭州中正生物认证技术有限公司 Fingerprint digital autograph device
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN1971575A (en) * 2006-11-24 2007-05-30 深圳兆日技术有限公司 An identity control method based on credibility platform module and fingerprint identifying
CN202854880U (en) * 2012-09-26 2013-04-03 深圳市亚略特生物识别科技有限公司 SMS payment system based on fingerprint identification mobile phone
CN103544599A (en) * 2012-07-09 2014-01-29 马克西姆综合产品公司 Embedded secure element for authentication, storage and transaction within a mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2609069Y (en) * 2002-04-03 2004-03-31 杭州中正生物认证技术有限公司 Fingerprint digital autograph device
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN1971575A (en) * 2006-11-24 2007-05-30 深圳兆日技术有限公司 An identity control method based on credibility platform module and fingerprint identifying
CN103544599A (en) * 2012-07-09 2014-01-29 马克西姆综合产品公司 Embedded secure element for authentication, storage and transaction within a mobile terminal
CN202854880U (en) * 2012-09-26 2013-04-03 深圳市亚略特生物识别科技有限公司 SMS payment system based on fingerprint identification mobile phone

Also Published As

Publication number Publication date
CN105354466A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
CN105354466B (en) A kind of fingerprint identification method and mobile terminal
US9819676B2 (en) Biometric capture for unauthorized user identification
CN106778183A (en) A kind of Terminal fingerprints know method for distinguishing and mobile terminal
CN106485164A (en) A kind of image processing method and mobile terminal
CN106445392A (en) Operating method of status bar icon and mobile terminal
CN106022196A (en) Information sharing method and intelligent terminal
CN106484303A (en) A kind of method preventing maloperation and electronic equipment
CN107506111A (en) The encryption and decryption method and terminal of a kind of terminal applies
CN107172278A (en) A kind of certification exchange method and mobile terminal
CN106127076A (en) The inspection method of a kind of photograph album photo and mobile terminal
CN106708658A (en) Data backup method, mobile terminal and storage server
CN106250757B (en) A kind of control method and mobile terminal of application program
CN106203061A (en) The encryption method of a kind of application program and mobile terminal
CN105956431A (en) Application protection processing method and mobile terminal
CN107632870A (en) The startup method and terminal of a kind of application
CN105867830A (en) Fingerprint identification-based processing method and mobile terminal
CN107390991A (en) The processing method and mobile terminal of a kind of sectional drawing
CN107103224A (en) A kind of unlocking method and mobile terminal
CN106355109A (en) File encryption method and mobile terminal
CN104346550A (en) Information processing method and electronic equipment
CN106709457A (en) Task execution method based on fingerprint, and mobile terminal
CN106557259A (en) A kind of operational approach and mobile terminal of mobile terminal
CN106156600A (en) The unlocking method of a kind of application program and mobile terminal
CN107422970A (en) A kind of unlocking method and mobile terminal
CN106384060A (en) Mobile terminal data encryption method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180514

Address after: 518101 21 building, customs building, 23 District, Baoan District Xin'an street, Shenzhen, Guangdong.

Patentee after: Weaver mobile communications (Shenzhen) Co., Ltd.

Address before: 523860 No. 283 BBK Avenue, Changan Town, Changan, Guangdong.

Patentee before: VIVO MOBILE COMMUNICATION CO., LTD.