CN105354466B - A kind of fingerprint identification method and mobile terminal - Google Patents
A kind of fingerprint identification method and mobile terminal Download PDFInfo
- Publication number
- CN105354466B CN105354466B CN201510705895.3A CN201510705895A CN105354466B CN 105354466 B CN105354466 B CN 105354466B CN 201510705895 A CN201510705895 A CN 201510705895A CN 105354466 B CN105354466 B CN 105354466B
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- security chip
- embedded security
- fingerprint recognition
- recognition result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
Abstract
The invention provides a kind of fingerprint identification method and mobile terminal, the method is applied to a mobile terminal for being provided with embedded security chip and trusted area module, and the method includes:When the instruction of fingerprint recognition is received, embedded security chip is made to obtain the fingerprint image of active user's input;Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;The fingerprint characteristic is sent to the microprocessor of the embedded security chip, make the microprocessor of the embedded security chip that data processing is carried out to the fingerprint characteristic and fingerprint recognition is carried out, obtain fingerprint recognition result;The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module;Make the trusted area module be digitally signed the fingerprint recognition result, and will be digitally signed after fingerprint recognition result send to the mobile terminal, complete fingerprint recognition.The present invention improves fingerprint payment safety, it is to avoid fingerprint identification process is maliciously tampered.
Description
Technical field
The present invention relates to the communications field, and more particularly, to a kind of fingerprint identification method and mobile terminal.
Background technology
With the fast development of mobile Internet, mobile payment is bright as the trend of the pith of payment technical field
It is bright.Under the promotion of mobile payment tide, the quick emergence of mobile payment not only brings facility to consumer, also leaves phase
The potential safety hazard answered, wherein, safety of payment undoubtedly becomes everybody one of concern the most.
Fingerprint pays a kind of mode of the identification identity as mobile payment, has in mobile payment field and widely should
With.The technological core that fingerprint pays is fingerprint identification technology, and fingerprint recognition belongs to biological identification technology, because of its not transreplication, nothing
The characteristic such as need to worry to lose or pass into silence, possess the safe class higher than ordinary password.
At present, some intelligent terminal, typically pass through pure software or in one hardware trusted context of intelligent terminal's internal build
Two ways is carrying out fingerprint recognition.Due to the opening of operating system, the encrypting fingerprint mode of pure software is difficult to resist and calculates
The attack of machine virus;And hardware trusted context mode runs a Mach as embedded safety system, to intelligence
The hardware modifications very little of energy terminal system, low cost can meet certain demand for security, but be only capable of providing appropriate safety, it is impossible to
Ensure that the related data interaction outside hardware trusted context by malicious attack or is not distorted, it is impossible to meet big amount and pay need
Ask.
The content of the invention
The embodiment of the present invention provides a kind of fingerprint identification method and mobile terminal, to solve existing intelligent terminal by pure
Software or in one hardware trusted context two ways of intelligent terminal's internal build carrying out fingerprint recognition, it is difficult to provide safety strong
The high fingerprint of degree pays the problem for ensureing.
In a first aspect, The embodiment provides a kind of fingerprint identification method, is applied to one and is provided with embedded peace
The mobile terminal of full chip and trusted area module, the method include:
When the instruction of fingerprint recognition is received, embedded security chip is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;
The fingerprint characteristic is sent to the microprocessor of the embedded security chip, make the embedded security chip
Microprocessor data processing is carried out to the fingerprint characteristic and fingerprint recognition is carried out, obtain fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module;
Make the trusted area module be digitally signed the fingerprint recognition result, and will be digitally signed after
Fingerprint recognition result is sent to the mobile terminal, completes fingerprint recognition.
On the other hand, embodiments of the invention additionally provide a kind of mobile terminal, and the mobile terminal includes embedded
Safety chip and trusted area module, the mobile terminal also include:
Acquisition module, it is defeated for when the instruction of fingerprint recognition is received, making embedded security chip obtain active user
The fingerprint image for entering;
Characteristic extracting module, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic;
Identification module, for sending the fingerprint characteristic to the microprocessor of the embedded security chip, makes described
The microprocessor of embedded security chip carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition
As a result;
Sending module, for making the embedded security chip fingerprint recognition result be sent to the trusted area
Module;
Signature blocks, for making the trusted area module be digitally signed the fingerprint recognition result, and by Jing
Fingerprint recognition result after digital signature is sent to the mobile terminal, completes fingerprint recognition.
So, the fingerprint identification method that the present invention is provided, on the one hand, special by the feature extraction and fingerprint that make fingerprint image
The differentiation process levied cannot invade chip internal in embedded security chip internal operation, long-range attack, it is impossible to obtain or distort
Fingerprint characteristic, comparison result etc., have fundamentally resisted long-range attack;On the other hand, embedded security chip will differentiate result
Preservation is sent into trusted area module, due to the safety of itself of trusted area module, differentiates that result also will not be in module
Inside it is maliciously tampered.The present invention by whole fingerprint identification process respectively in embedded security chip and trusted area module it is complete
Into, by the combination of embedded security chip and trusted area module, while Consumer's Experience is not reduced, improve fingerprint
The safety paid, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted, and protects the fund security of user.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be in embodiment or description of the prior art
The required accompanying drawing for using is briefly described, it should be apparent that, drawings in the following description are only some realities of the present invention
Example is applied, for those of ordinary skill in the art, without having to pay creative labor, can be with attached according to these
Figure obtains other accompanying drawings.
Fig. 1 represents the basic step flow chart of the fingerprint identification method that the first embodiment of the present invention is provided;
Fig. 2 represents the basic step flow chart of the fingerprint identification method that the second embodiment of the present invention is provided;
Fig. 3 is the block diagram of the mobile terminal that third embodiment of the invention is provided;
Fig. 4 is the block diagram of the mobile terminal that fourth embodiment of the invention is provided;
Fig. 5 is the block diagram of the mobile terminal that fifth embodiment of the invention is provided;
Fig. 6 is the block diagram of the mobile terminal that fifth embodiment of the invention is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this
Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art
Example, belongs to the scope of protection of the invention.
First embodiment
The first embodiment of the present invention provides a kind of fingerprint identification method, is applied to one and is provided with embedded security chip
With the mobile terminal of trusted area module, fingerprint is obtained by embedded security chip first and fingerprint differentiation is carried out, then will be sentenced
Other result is sent to trusted area module, trusted area module is retransmited after being digitally signed to movement eventually to differentiating result
End.
Specifically, referring to Fig. 1, the first embodiment of the present invention provides a kind of fingerprint identification method, and the method includes:
Step 101, when the instruction of fingerprint recognition is received, makes embedded security chip obtain the finger of active user's input
Print image.
Wherein, the acquisition of fingerprint image is carried out inside embedded security chip, and long-range attack cannot invade chip internal,
Cannot obtain or distort fingerprint characteristic.
Step 102, carries out feature extraction to fingerprint image, obtains fingerprint characteristic.
In the embodiment of the present invention, fingerprint image is not directly stored in fingerprint identification technology, but is carried in fingerprint image
The feature of fetching print image.Fingerprint characteristic includes expanding spectrum signature of type feature and fingerprint of fingerprint etc..
Step 103, fingerprint characteristic is sent to the microprocessor of embedded security chip, makes the micro- of embedded security chip
Processor carries out data processing and carries out fingerprint recognition to fingerprint characteristic, obtains fingerprint recognition result.
In the embodiment of the present invention, fingerprint identification process cannot be invaded in embedded security chip internal operation, long-range attack
Chip internal, it is impossible to obtain or distort comparison result, has fundamentally resisted long-range attack.
Step 104, makes embedded security chip fingerprint recognition result be sent to trusted area module.
In the embodiment of the present invention, trusted area module (TrustZone) is a part for mobile terminal hardware configuration, with shifting
The operating system of dynamic terminal is mutually isolated, is the security system of an isolated operation.Trusted area module itself has safety,
Differentiate that result will not be maliciously tampered in module.
Step 105, makes trusted area module be digitally signed fingerprint recognition result, and will be digitally signed after
Fingerprint recognition result is sent to mobile terminal, completes fingerprint recognition.
Specifically, digital signature is just attached to some data in data cell, or data cell is done it is close
Code conversion, this data or cryptographic transformation allow the recipient of data cell to confirm source and the data cell of data cell
Integrity and protect data, prevent from maliciously being forged.It is a kind of method that the message to electronic form is signed, one
Signature information can be transmitted in a communication network;Briefly, digital signature is a kind of method for differentiating digital information,
Only the sender of information could produce, the data that others cannot forge, these data are also simultaneously the sender to information
Send a valid certificates of information authenticity.
In the embodiment of the present invention, trusted area module to differentiate result be digitally signed, and will be digitally signed after
Fingerprint recognition result send to mobile terminal, complete fingerprint recognition.Other programs cannot forge the digital signature, it is impossible to malice
Distort differentiation result.
In the above embodiment of the present invention, after obtaining fingerprint image to be identified, after carrying out feature extraction, send to embedded
The microprocessor of formula safety chip, completes differentiation process in embedded security chip, and will directly differentiate that result is sent to can
Letter regions module.As the feature extraction of fingerprint image and the differentiation process of fingerprint characteristic are all transported inside embedded security chip
OK, long-range attack cannot invade chip internal, it is impossible to obtain or distort fingerprint characteristic, comparison result etc., fundamentally resist
Long-range attack;On the other hand, in embodiments of the invention, embedded security chip will differentiate that result is sent to trusted area module
Middle preservation, due to the safety of itself of trusted area module, differentiates that result also will not be maliciously tampered in module.
In the above embodiment of the present invention, by whole fingerprint identification process respectively in embedded security chip and trusted area
Complete in module, by the combination of embedded security chip and trusted area module, while Consumer's Experience is not reduced, improve
The safety that fingerprint pays, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted, and protects the money of user
Golden safety.
Before step 101, further include:
When receive user store fingerprint template instruction when, make embedded security chip obtain the user input be intended to deposit
The fingerprint image of storage;
Make the microprocessor of embedded security chip data processing be carried out to the fingerprint image for obtaining, obtain the finger of the user
Stricture of vagina template is simultaneously preserved.
Wherein, the built-in key of embedded security chip is write by disposable fusing when chip dispatches from the factory, it is impossible to from outer
Portion reads and writes and changes, therefore, external program cannot obtain the built-in key of embedded security chip, it is impossible to be gone out according to key recovery
Fingerprint template.
Further, the fingerprint image to obtaining carries out data processing, obtains the fingerprint template of the user and preserves, specifically
Including:
Fingerprint image of the microprocessor of embedded security chip according to built-in algorithm to be stored is made to be encrypted place
Reason, obtains fingerprint template and preserves.
In the above embodiment of the present invention, when the instruction of storage fingerprint template is received, the fingerprint image to be stored is obtained
Picture, and the fingerprint image to be stored is encrypted according to built-in algorithm by microprocessor, obtain fingerprint template simultaneously
Preserve.As external program cannot restore fingerprint template by breaking cryptographic keys, therefore, in the above embodiment of the present invention, refer to
The preservation safety of stricture of vagina template is higher, and external program cannot distort fingerprint recognition result by reducing fingerprint template.
Second embodiment
As shown in Fig. 2 the second embodiment of the present invention provide a kind of fingerprint identification method, be applied to one be provided with it is embedded
The mobile terminal of formula safety chip and trusted area module, the method include:
Step 201, when the instruction of fingerprint recognition is received, the fingerprint image for obtaining active user's input makes embedded peace
Full chip obtains the fingerprint image of active user's input.
In the step, the acquisition of fingerprint image is carried out inside embedded security chip, and long-range attack cannot invade chip
It is internal, it is impossible to obtain or distort fingerprint characteristic.
Step 202, carries out feature extraction to fingerprint image, obtains fingerprint characteristic.
In the embodiment of the present invention, fingerprint image is not directly stored in fingerprint identification technology, but is carried in fingerprint image
The feature of fetching print image.Fingerprint characteristic includes expanding spectrum signature of type feature and fingerprint of fingerprint etc..
Step 203, makes the microprocessor of embedded security chip that place is encrypted to fingerprint characteristic according to built-in algorithm
Reason, obtains cryptographic fingerprint information.
Wherein, the microprocessor of embedded security chip is encrypted to fingerprint characteristic according to built-in algorithm first, by
The key of embedded security chip cannot be cracked in external program, therefore malice cannot be carried out to fingerprint characteristic and be distorted.
Step 204, enters to cryptographic fingerprint information and fingerprint template according to default recognition rule in embedded security chip
Row identification, obtains fingerprint recognition result.
Wherein, cryptographic fingerprint information and fingerprint template are identified, draw recognition result, whole process is in embedded core
Piece internal operation, data will not be intercepted and captured or be distorted by external program.
Step 205, makes embedded security chip fingerprint recognition result be sent to trusted area module.
In the embodiment of the present invention, trusted area module (TrustZone) is a part for mobile terminal hardware configuration, with shifting
The operating system of dynamic terminal is mutually isolated, is the security system of an isolated operation.Trusted area module itself has safety,
Differentiate that result will not be maliciously tampered in module.
Step 206, makes trusted area module be digitally signed fingerprint recognition result, and will be digitally signed after
Fingerprint recognition result is sent to mobile terminal, completes fingerprint recognition.
Specifically, digital signature is just attached to some data in data cell, or data cell is done it is close
Code conversion, this data or cryptographic transformation allow the recipient of data cell to confirm source and the data cell of data cell
Integrity and protect data, prevent from maliciously being forged.It is a kind of method that the message to electronic form is signed, one
Signature information can be transmitted in a communication network;Briefly, digital signature is a kind of method for differentiating digital information,
Only the sender of information could produce, the data that others cannot forge, these data are also simultaneously the sender to information
Send a valid certificates of information authenticity.
In the embodiment of the present invention, trusted area module is digitally signed to fingerprint recognition result, and will be digitally signed
Fingerprint recognition result afterwards is sent to mobile terminal, completes fingerprint recognition, and other programs cannot forge the digital signature, it is impossible to
Malice distorts differentiation result.
Further, step 204 is specifically included:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information
Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know
Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied
Really.
In the above embodiment of the present invention, the microprocessor of embedded security chip is first according to built-in algorithm to fingerprint
Feature is encrypted, then cryptographic fingerprint information and fingerprint template are identified, and draws recognition result, and whole process is embedded
Chip internal runs, and data will not be intercepted and captured or be distorted by external program, and external program cannot be distorted by attacking differentiation process
Recognition result.In the above embodiment of the present invention, fingerprint recognition is improved by the safety curtain of increase fingerprint differentiation process
Safety, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted, and protects the fund security of user.
3rd embodiment
The above first embodiment of the present invention to second embodiment introduction be the present invention provide fingerprint recognition method
Content, be described below the fourth embodiment of the present invention offer mobile terminal.
Referring to Fig. 3, Fig. 3 is the block diagram of the mobile terminal that third embodiment of the invention is provided.Mobile terminal shown in Fig. 3
300 include:Acquisition module 301, characteristic extracting module 302, identification module 303, sending module 304 and signature blocks 305.
Acquisition module 301, for when the instruction of fingerprint recognition is received, making embedded security chip obtain active user
The fingerprint image of input;
Wherein, the acquisition of fingerprint image is carried out inside embedded security chip, and long-range attack cannot invade chip internal,
Cannot obtain or distort fingerprint characteristic.
Characteristic extracting module 302, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic.
Identification module 303, for sending fingerprint characteristic to the microprocessor of embedded security chip, makes embedded-type security
The microprocessor of chip carries out data processing and carries out fingerprint recognition to fingerprint characteristic, obtains fingerprint recognition result.
Wherein, in embedded security chip internal operation, long-range attack cannot invade chip internal, nothing to fingerprint identification process
Method is obtained or distorts comparison result, has fundamentally resisted long-range attack.
Sending module 304, for making embedded security chip fingerprint recognition result be sent to trusted area module.
Signature blocks 305, for making trusted area module be digitally signed fingerprint recognition result, and Jing numerals are signed
Fingerprint recognition result after name is sent to mobile terminal, completes fingerprint recognition.
Wherein, trusted area module is digitally signed to differentiating result, and other programs cannot be forged the numeral and be signed
Name, it is impossible to maliciously distort differentiation result.
The mobile terminal that the above embodiment of the present invention is provided, by whole fingerprint identification process respectively in embedded-type security core
Complete in piece and trusted area module, by the combination of embedded security chip and trusted area module, do not reducing user's body
While testing, the safety of fingerprint payment is improve, it is to avoid fingerprint identification process is remotely controlled or other modes malice is distorted,
The fund security of protection user.
Fourth embodiment
On the basis of Fig. 3, alternatively, mobile terminal 300 also includes:Template acquisition module and template preserving module,
Identification module 303 includes:Encryption submodule and fingerprint recognition submodule, referring to Fig. 4, Fig. 4 is that fourth embodiment of the invention is carried
For mobile terminal block diagram, the mobile terminal 400 shown in Fig. 4 includes:Acquisition module 401, characteristic extracting module 402, identification
Module 403, encryption submodule 4031, fingerprint recognition submodule 4032, sending module 304, signature blocks 405, template obtain mould
Block 406 and template preserving module 407:
Acquisition module 401, for when the instruction of fingerprint recognition is received, making embedded security chip obtain active user
The fingerprint image of input.
Characteristic extracting module 402, for carrying out feature extraction to fingerprint image, obtains fingerprint characteristic.
Identification module 403, for sending fingerprint characteristic to the microprocessor of embedded security chip, makes embedded-type security
The microprocessor of chip carries out data processing and carries out fingerprint recognition to fingerprint characteristic, obtains fingerprint recognition result.
Wherein, identification module 403 includes encrypting submodule 4031 and fingerprint recognition submodule 4032.
Encryption submodule 4031, for making the microprocessor of embedded security chip according to built-in algorithm to fingerprint characteristic
It is encrypted, obtains cryptographic fingerprint information.
Fingerprint recognition submodule 4032, for being believed to cryptographic fingerprint according to default recognition rule in embedded security chip
Breath is identified with fingerprint template, obtains fingerprint recognition result.
Wherein, the microprocessor of embedded security chip is encrypted to fingerprint characteristic according to built-in algorithm first, by
The key of embedded security chip cannot be cracked in external program, therefore malice cannot be carried out to fingerprint characteristic and be distorted.
Alternatively, fingerprint recognition submodule 4032 specifically for:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information
Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know
Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied
Really.
Sending module 404, for making embedded security chip fingerprint recognition result be sent to trusted area module;
Signature blocks 405, for making trusted area module be digitally signed fingerprint recognition result, and Jing numerals are signed
Fingerprint recognition result after name is sent to mobile terminal, completes fingerprint recognition.
Template acquisition module 406, for receiving in acquisition module 401 during the instruction of fingerprint recognition, makes embedded-type security
Before chip obtains the fingerprint image of active user's input,
When receive user store fingerprint template instruction when, make embedded security chip obtain the user input be intended to deposit
The fingerprint image of storage;
Template preserving module 407, for making the microprocessor of embedded security chip enter line number to the fingerprint image for obtaining
According to process, obtain the fingerprint template of the user and preserve.
Wherein, the built-in key of embedded security chip is write by disposable fusing when chip dispatches from the factory, it is impossible to from outer
Portion reads and writes and changes, therefore, external program cannot obtain the built-in key of embedded security chip, it is impossible to be gone out according to key recovery
Fingerprint template.
Alternatively, template preserving module 407 specifically for:
The microprocessor of the embedded security chip is made to be entered to the fingerprint image to be stored according to built-in algorithm
Row encryption, obtains fingerprint template and preserves.
The mobile terminal that the above embodiment of the present invention is provided, when the instruction of storage fingerprint template is received, obtains and is intended to
The fingerprint image of storage, and the fingerprint image to be stored is encrypted according to built-in algorithm by microprocessor, obtain
To fingerprint template and preserve.As external program cannot restore fingerprint template by breaking cryptographic keys, therefore, the present invention's is above-mentioned
In the mobile terminal that embodiment is provided, the preservation safety of fingerprint template is higher, and external program cannot be by reducing fingerprint template
To distort fingerprint recognition result.
It is each that mobile terminal in above-described embodiment can realize that mobile terminal in the embodiment of the method for Fig. 1 to Fig. 2 is realized
Individual process, to avoid repeating, is repeated no more here.In the mobile terminal that the above embodiment of the present invention is provided, embedded-type security
The microprocessor of chip is encrypted to fingerprint characteristic according to built-in algorithm first, then by cryptographic fingerprint information and fingerprint template
It is identified, draws recognition result, whole process will not be intercepted and captured or be usurped by external program in embedded chip internal operation, data
Change, external program cannot be by attacking differentiation process come tamper Detection result.
5th embodiment
Fig. 5 is the block diagram of the mobile terminal of fifth embodiment of the invention.Mobile terminal 500 shown in Fig. 5 includes:At least one
Individual processor 501, memorizer 502, at least one network interface 504, other users interface 503, embedded security chip 506 with
And trusted area module 507.Each component in mobile terminal 500 is coupled by bus system 505.It is understood that total
Linear system system 505 is used to realize the connection communication between these components.Bus system 505 also includes in addition to including data/address bus
Power bus, controlling bus and status signal bus in addition.But for the sake of for clear explanation, in Figure 5 various buses are all designated as
Bus system 505.
Wherein, user interface 503 can include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memorizer 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and which is used as outside height
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double DataRate
SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory
(DirectRambusRAM, DRRAM).The memorizer 502 of system and method described herein be intended to including but not limited to these and
The memorizer of any other suitable type.
In some embodiments, memorizer 502 stores following element, can perform module or data structure, or
Person their subset, or their superset:Operating system 5021 and application program 5022.
Wherein, operating system 5021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and process hardware based task.Application program 5022, comprising various application programs, such as media
Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side
The program of method is may be embodied in application program 5022.
Wherein, enter row data communication between embedded security chip 506 and processor 501 and trusted area module 507,
506 built-in key of embedded security chip, and write by disposable fusing when chip dispatches from the factory, it is impossible to from exterior read-write and repair
Change, therefore, external program cannot crack the built-in key of embedded security chip 506.
Wherein, trusted area module 507 is a part for 500 hardware configuration of mobile terminal, with embedded security chip 506
And between mobile terminal 500, enter row data communication, and it is mutually isolated with the operating system of mobile terminal 500, it is one independent
The security system of operation.Trusted area module 507 itself has safety, and the data of storage inside will not be in module by malice
Distort.
In embodiments of the present invention, by call memorizer 502 storage program or instruction, specifically, can be application
The program stored in program 5022 or instruction, processor 501 are used for:
When the instruction of fingerprint recognition is received, embedded security chip 506 is made to obtain the fingerprint image of active user's input
Picture;
Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;
Fingerprint characteristic is sent to the microprocessor of the embedded security chip 506, make the embedded security chip
506 microprocessor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module trusted area
Module 507;
Be digitally signed the fingerprint recognition result of the trusted area module 507 pairs, and by it is digitally signed it
Fingerprint recognition result afterwards is sent to the mobile terminal, completes fingerprint recognition.
The method that the embodiments of the present invention are disclosed is can apply in processor 501, or is realized by processor 501.
A kind of possibly IC chip of processor 501, the disposal ability with signal.During realization, said method it is each
Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 501 or software form.Above-mentioned process
Device 501 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field
Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic,
Discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and logic diagram.It is general
Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to embodiment of the present invention institute
The step of disclosed method, can be embodied directly in hardware decoding processor and perform and complete, or with the hardware in decoding processor
And software module combination execution is completed.Software module may be located at random access memory, and flash memory, read only memory may be programmed read-only
In the ripe storage medium in this area such as memorizer or electrically erasable programmable memory, depositor.The storage medium is located at
Memorizer 502, processor 501 read the information in memorizer 502, the step of complete said method with reference to its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combine to realize.For hardware is realized, processing unit can be realized in one or more special ICs (Application
Specific Integrated Circuit, ASIC), digital signal processor (Digital Signal Processor,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable
LogicDevice, PLD), field programmable gate array (Field Programmable Gate Array, FPGA), general place
In reason device, controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
For software is realized, can be realized herein by the module (such as process, function etc.) of execution function described herein
Described technology.During software code is storable in memorizer and by computing device.Memorizer can within a processor or
Realize outside processor.
Alternatively, processor 501 is additionally operable to:When the instruction of fingerprint recognition is received, obtain embedded security chip 506
Before taking the fingerprint image of active user's input:
When the instruction of user's storage fingerprint template is received, embedded security chip 506 is made to obtain the user input
The fingerprint image to be stored;
Make the microprocessor of embedded security chip 506 data processing be carried out to the fingerprint image for obtaining, obtain the user
Fingerprint template and preserve.
Alternatively, as another embodiment, processor 501 is additionally operable to:
It is encrypted fingerprint image of the microprocessor of embedded security chip 506 according to built-in algorithm to be stored
Process, obtain fingerprint template and preserve.Alternatively, as another embodiment, processor 501 makes embedded security chip 506
Microprocessor fingerprint characteristic is encrypted according to built-in algorithm, obtain cryptographic fingerprint information;
Cryptographic fingerprint information and fingerprint template are known according to default recognition rule in embedded security chip 506
Not, obtain fingerprint recognition result.Alternatively, as another embodiment, processor 501 is additionally operable to:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information
Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know
Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied
Really.Mobile terminal 500 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here no longer
Repeat.
The mobile terminal provided in the above embodiment of the present invention, by detecting to pattern edge, when touching for user
When touching the marginal position of object on operation and screen and partially overlapping, generate fingerprint recognition signal and simultaneously start feedback effectss, use
Family produces a kind of dragging by touch operation and feels, and gives user more real experience.
Sixth embodiment
Fig. 6 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 6
600 can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA), or vehicle mounted electric
Brain etc..
Mobile terminal 600 in Fig. 6 includes that radio frequency (RadioFrequency, RF) circuit 610, memorizer 620, input are single
Unit 630, display unit 640, processor 660, voicefrequency circuit 670, WiFi (Wireless Fidelity) module 680, power supply
690th, embedded security chip 6100 and trusted area module 6200.
Wherein, input block 630 can be used for the numeral or character information of receiving user's input, and produce and mobile terminal
The signal input that 600 user is arranged and function control is relevant.Specifically, in the embodiment of the present invention, the input block 630 can
With including contact panel 631.Contact panel 631, also referred to as touch screen, can collect user thereon or neighbouring touch operation
(such as user is using the operation of any suitable object or adnexa on contact panel 631 such as finger, stylus), and according to advance
The formula of setting drives corresponding attachment means.Optionally, contact panel 631 may include touch detecting apparatus and touch controller
Two parts.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation brings is detected, by signal
Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate,
Give the processor 660 again, and the order sent of receiving processor 660 can be performed.Furthermore, it is possible to adopt resistance-type,
The polytypes such as condenser type, infrared ray and surface acoustic wave realize contact panel 631.Except contact panel 631, input block
630 can also include other input equipments 632, and other input equipments 632 can include but is not limited to physical keyboard, function key
One or more in (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 640 can be used for display by the information of user input or be supplied to information and the movement of user
The various menu interfaces of terminal 600.Display unit 640 may include display floater 641, optionally, can adopt LCD or organic
The forms such as optical diode (Organic Light-Emitting Diode, OLED) are configuring display floater 641.
It should be noted that contact panel 631 can cover display floater 641, touch display screen is formed, when the touch display screen is examined
Measure thereon or after neighbouring touch operation, processor 660 is sent to determine the type of touch event, with preprocessor
660 provide corresponding visual output in touch display screen according to the type of touch event.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area
And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can be distinguished two and show
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area
It can also be the empty interface not comprising any content.The conventional control viewing area be used for show the higher control of utilization rate, for example,
Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein, processor 660 is the control centre of mobile terminal 600, using various interfaces and connection whole mobile phone
Various pieces, be stored in software program and/or module in first memory 621 by running or performing, and call and deposit
The data in second memory 622 are stored up, the various functions and processing data of mobile terminal 600 is performed, so as to mobile terminal
600 carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
Wherein, carry out data to lead between embedded security chip 6100 and processor 660 and trusted area module 6200
Letter, 6100 built-in key of embedded security chip, and write by disposable fusing when chip dispatches from the factory, it is impossible to from exterior read-write
And modification, therefore, external program cannot crack the built-in key of embedded security chip 6100.
Wherein, trusted area module 6200 is a part for 600 hardware configuration of mobile terminal, with embedded security chip
Enter row data communication between 6100, and it is mutually isolated with the operating system of mobile terminal 600, it is the safety body of an isolated operation
System.The data that trusted area module 6200 itself has safety, storage inside will not be maliciously tampered in module.
In embodiments of the present invention, by call store the first memory 621 in software program and/or module and/
Or the data in the second memory 622, processor 660 is used for:
When the instruction of fingerprint recognition is received, embedded security chip 6100 is made to obtain the fingerprint image of active user's input
Picture;
Feature extraction is carried out to fingerprint image, fingerprint characteristic is obtained;
Fingerprint characteristic is sent to the microprocessor of the embedded security chip 6100, make the embedded security chip
6100 microprocessor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module 6200;
Be digitally signed the fingerprint recognition result of the trusted area module 6200 pairs, and by it is digitally signed it
Fingerprint recognition result afterwards is sent to the mobile terminal, completes fingerprint recognition.
Alternatively, processor 660 is additionally operable to:When the instruction of fingerprint recognition is received, embedded security chip 6100 is made
Before obtaining the fingerprint image of active user's input:
When the instruction of user's storage fingerprint template is received, embedded security chip 6100 is made to obtain the user input
The fingerprint image to be stored;
Make the microprocessor of embedded security chip 6100 data processing be carried out to the fingerprint image for obtaining, obtain the user
Fingerprint template and preserve.
Alternatively, as another embodiment, processor 660 is additionally operable to:
Fingerprint image of the microprocessor of embedded security chip 6100 according to built-in algorithm to be stored is made to carry out adding
Close process, obtains fingerprint template and preserves.Alternatively, as another embodiment, processor 660 makes embedded security chip
6100 microprocessor is encrypted to fingerprint characteristic according to built-in algorithm, obtains cryptographic fingerprint information;
Cryptographic fingerprint information and fingerprint template are known according to default recognition rule in embedded security chip 6100
Not, obtain fingerprint recognition result.
Alternatively, as another embodiment, processor 660 is additionally operable to:
The similarity discriminant value in default recognition rule is obtained, and it is similar to fingerprint template to contrast cryptographic fingerprint information
Degree:
If cryptographic fingerprint information is more than or equal to similarity discriminant value with the similarity of fingerprint template, generates correct fingerprint and know
Other result;
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied
Really.Mobile terminal 600 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here no longer
Repeat.
If cryptographic fingerprint information is less than similarity discriminant value with the similarity of fingerprint template, the fingerprint recognition of generation error is tied
Really.Mobile terminal 600 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here no longer
Repeat.
It can be seen that, the mobile terminal provided in the above embodiment of the present invention, by detecting to pattern edge, works as user
Touch operation and screen on the marginal position of object when partially overlapping, generate fingerprint recognition signal and simultaneously start feedback effectss,
Make user a kind of dragging be produced by touch operation to feel, give user more real experience.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually
Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel
Each specific application can be used different methods to realize described function, but this realization it is not considered that exceeding
The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other
Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the unit is only
A kind of division of logic function, can have when actually realizing other dividing mode, such as multiple units or component can with reference to or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention.
And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes
Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Claims (10)
1. a kind of fingerprint identification method, is applied to a mobile terminal for being provided with embedded security chip and trusted area module,
Characterized in that, the method includes:
When the instruction of fingerprint recognition is received, the embedded security chip is made to obtain the fingerprint image of active user's input;
Feature extraction is carried out to the fingerprint image, fingerprint characteristic is obtained;
The fingerprint characteristic is sent to the microprocessor of the embedded security chip, make the micro- of the embedded security chip
Processor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition result;
The embedded security chip is made the fingerprint recognition result to be sent to the trusted area module;
Make the trusted area module be digitally signed the fingerprint recognition result, and will be digitally signed after fingerprint
Recognition result is sent to the mobile terminal, completes fingerprint recognition;
Wherein, it is described the step of make the trusted area module be digitally signed the fingerprint recognition result, including:Make institute
State trusted area module and the fingerprint recognition result is added into preset data, or password change is carried out to the fingerprint recognition result
Change, the preset data is to confirm source and the integrity of the fingerprint recognition result.
2. fingerprint identification method according to claim 1, it is characterised in that described when the instruction that receive fingerprint recognition
When, the step of make the embedded security chip obtain the fingerprint image of active user's input before, also include:
When receive user store fingerprint template instruction when, make the embedded security chip obtain the user input be intended to deposit
The fingerprint image of storage;
Make the microprocessor of the embedded security chip data processing be carried out to the fingerprint image for obtaining, obtain the finger of the user
Stricture of vagina template is simultaneously preserved.
3. fingerprint identification method according to claim 2, it is characterised in that described to make the micro- of the embedded security chip
Processor carries out data processing to the fingerprint image of the acquisition, obtains the fingerprint template of the user and specifically wraps the step of preservation
Include:
The microprocessor of the embedded security chip is made to carry out adding to the fingerprint image to be stored according to built-in algorithm
Close process, obtains fingerprint template and preserves.
4. fingerprint identification method according to claim 3, it is characterised in that described to make the micro- of the embedded security chip
Processor carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, specifically wraps the step of obtain fingerprint recognition result
Include:
The microprocessor of the embedded security chip is made to be encrypted place to the fingerprint characteristic according to the built-in algorithm
Reason, obtains cryptographic fingerprint information;
The cryptographic fingerprint information and the fingerprint template are entered according to default recognition rule in the embedded security chip
Row identification, obtains fingerprint recognition result.
5. fingerprint identification method according to claim 4, it is characterised in that described according in the embedded security chip
Default recognition rule is identified to the cryptographic fingerprint information and the fingerprint template, the step of obtain fingerprint recognition result
Specifically include:
The similarity discriminant value in the default recognition rule is obtained, and the cryptographic fingerprint information is contrasted with the fingerprint mould
The similarity of plate:
If the cryptographic fingerprint information is more than or equal to the similarity discriminant value with the similarity of the fingerprint template, generate correct
Fingerprint recognition result;
If the cryptographic fingerprint information is less than the similarity discriminant value, the finger of generation error with the similarity of the fingerprint template
Stricture of vagina recognition result.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes embedded security chip and trusted area module,
The mobile terminal also includes:
Acquisition module, it is defeated for when the instruction of fingerprint recognition is received, making the embedded security chip obtain active user
The fingerprint image for entering;
Characteristic extracting module, for carrying out feature extraction to the fingerprint image, obtains fingerprint characteristic;
Identification module, for sending the fingerprint characteristic to the microprocessor of the embedded security chip, makes described embedded
The microprocessor of formula safety chip carries out data processing and carries out fingerprint recognition to the fingerprint characteristic, obtains fingerprint recognition knot
Really;
Sending module, for making the embedded security chip fingerprint recognition result be sent to the trusted area mould
Block;
Signature blocks are for making the trusted area module be digitally signed the fingerprint recognition result and Jing is digital
Fingerprint recognition result after signature is sent to the mobile terminal, completes fingerprint recognition;
Wherein, the signature blocks specifically for:Make the trusted area module that the fingerprint recognition result is added present count
According to, or cryptographic transformation is carried out to the fingerprint recognition result, the preset data is to confirm coming for the fingerprint recognition result
Source and integrity.
7. mobile terminal according to claim 6, it is characterised in that the mobile terminal also includes:
Template acquisition module, for receiving in the acquisition module during instruction of fingerprint recognition, makes the embedded-type security core
Before piece obtains the fingerprint image of active user's input,
When receive user store fingerprint template instruction when, make the embedded security chip obtain the user input be intended to deposit
The fingerprint image of storage;
Template preserving module, for making the microprocessor of the embedded security chip enter line number to the fingerprint image of the acquisition
According to process, obtain the fingerprint template of the user and preserve.
8. mobile terminal according to claim 7, it is characterised in that the template preserving module specifically for:
The microprocessor of the embedded security chip is made to carry out adding to the fingerprint image to be stored according to built-in algorithm
Close process, obtains fingerprint template and preserves.
9. mobile terminal according to claim 8, it is characterised in that the identification module includes:
Encryption submodule, for making the microprocessor of the embedded security chip according to the built-in algorithm to the fingerprint
Feature is encrypted, and obtains cryptographic fingerprint information;
Fingerprint recognition submodule, for being believed to the cryptographic fingerprint according to default recognition rule in the embedded security chip
Breath is identified with the fingerprint template, obtains fingerprint recognition result.
10. mobile terminal according to claim 9, it is characterised in that the fingerprint recognition submodule specifically for:
The similarity discriminant value in the default recognition rule is obtained, and the cryptographic fingerprint information is contrasted with the fingerprint mould
The similarity of plate:
If the cryptographic fingerprint information is more than or equal to the similarity discriminant value with the similarity of the fingerprint template, generate correct
Fingerprint recognition result;
If the cryptographic fingerprint information is less than the similarity discriminant value, the finger of generation error with the similarity of the fingerprint template
Stricture of vagina recognition result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510705895.3A CN105354466B (en) | 2015-10-26 | 2015-10-26 | A kind of fingerprint identification method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510705895.3A CN105354466B (en) | 2015-10-26 | 2015-10-26 | A kind of fingerprint identification method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105354466A CN105354466A (en) | 2016-02-24 |
CN105354466B true CN105354466B (en) | 2017-03-29 |
Family
ID=55330437
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510705895.3A Active CN105354466B (en) | 2015-10-26 | 2015-10-26 | A kind of fingerprint identification method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105354466B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975837B (en) * | 2016-06-12 | 2019-04-30 | 北京集创北方科技股份有限公司 | Calculate equipment, biological feather recognition method and template register method |
CN105975838A (en) * | 2016-06-12 | 2016-09-28 | 北京集创北方科技股份有限公司 | Secure chip, biological feature identification method and biological feature template registration method |
CN106897596B (en) * | 2017-01-20 | 2020-06-19 | 北京安云世纪科技有限公司 | Fingerprint verification method and related equipment |
CN106886699B (en) * | 2017-01-20 | 2020-06-19 | 北京安云世纪科技有限公司 | Fingerprint verification method and related equipment |
CN106909820B (en) * | 2017-01-20 | 2020-07-28 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal and fingerprint data processing method and device thereof |
CN106897595B (en) * | 2017-01-20 | 2020-04-03 | 北京安云世纪科技有限公司 | Mobile terminal |
CN110651268B (en) * | 2017-05-23 | 2023-10-17 | 指纹卡安娜卡敦知识产权有限公司 | Method for authenticating user and electronic equipment |
CN109214234A (en) * | 2017-06-29 | 2019-01-15 | 上海荆虹电子科技有限公司 | The image sensor chip and terminal device of multilayer embedded bio-identification algorithm |
CN109214236A (en) * | 2017-06-29 | 2019-01-15 | 上海荆虹电子科技有限公司 | The image sensor chip and terminal device of the double-deck embedded bio recognizer |
CN109284639A (en) * | 2017-07-21 | 2019-01-29 | 深圳如探索科技有限公司 | Data processing method, device and equipment |
CN108563934B (en) * | 2018-03-09 | 2020-07-10 | 青岛海信移动通信技术股份有限公司 | Fingerprint unlocking method and device |
CN109101808A (en) * | 2018-10-29 | 2018-12-28 | 广东长实通信科技有限公司 | A kind of communication encryption apparatus and system of high security |
WO2020220213A1 (en) * | 2019-04-29 | 2020-11-05 | 深圳市汇顶科技股份有限公司 | Biological feature recognition method and electronic device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2609069Y (en) * | 2002-04-03 | 2004-03-31 | 杭州中正生物认证技术有限公司 | Fingerprint digital autograph device |
CN1822013A (en) * | 2006-03-14 | 2006-08-23 | 上海一维科技有限公司 | Finger print biological identifying engine system and its identifying method based on credible platform module |
CN1971575A (en) * | 2006-11-24 | 2007-05-30 | 深圳兆日技术有限公司 | An identity control method based on credibility platform module and fingerprint identifying |
CN202854880U (en) * | 2012-09-26 | 2013-04-03 | 深圳市亚略特生物识别科技有限公司 | SMS payment system based on fingerprint identification mobile phone |
CN103544599A (en) * | 2012-07-09 | 2014-01-29 | 马克西姆综合产品公司 | Embedded secure element for authentication, storage and transaction within a mobile terminal |
-
2015
- 2015-10-26 CN CN201510705895.3A patent/CN105354466B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2609069Y (en) * | 2002-04-03 | 2004-03-31 | 杭州中正生物认证技术有限公司 | Fingerprint digital autograph device |
CN1822013A (en) * | 2006-03-14 | 2006-08-23 | 上海一维科技有限公司 | Finger print biological identifying engine system and its identifying method based on credible platform module |
CN1971575A (en) * | 2006-11-24 | 2007-05-30 | 深圳兆日技术有限公司 | An identity control method based on credibility platform module and fingerprint identifying |
CN103544599A (en) * | 2012-07-09 | 2014-01-29 | 马克西姆综合产品公司 | Embedded secure element for authentication, storage and transaction within a mobile terminal |
CN202854880U (en) * | 2012-09-26 | 2013-04-03 | 深圳市亚略特生物识别科技有限公司 | SMS payment system based on fingerprint identification mobile phone |
Also Published As
Publication number | Publication date |
---|---|
CN105354466A (en) | 2016-02-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105354466B (en) | A kind of fingerprint identification method and mobile terminal | |
US9819676B2 (en) | Biometric capture for unauthorized user identification | |
CN106778183A (en) | A kind of Terminal fingerprints know method for distinguishing and mobile terminal | |
CN106485164A (en) | A kind of image processing method and mobile terminal | |
CN106445392A (en) | Operating method of status bar icon and mobile terminal | |
CN106022196A (en) | Information sharing method and intelligent terminal | |
CN106484303A (en) | A kind of method preventing maloperation and electronic equipment | |
CN107506111A (en) | The encryption and decryption method and terminal of a kind of terminal applies | |
CN107172278A (en) | A kind of certification exchange method and mobile terminal | |
CN106127076A (en) | The inspection method of a kind of photograph album photo and mobile terminal | |
CN106708658A (en) | Data backup method, mobile terminal and storage server | |
CN106250757B (en) | A kind of control method and mobile terminal of application program | |
CN106203061A (en) | The encryption method of a kind of application program and mobile terminal | |
CN105956431A (en) | Application protection processing method and mobile terminal | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN105867830A (en) | Fingerprint identification-based processing method and mobile terminal | |
CN107390991A (en) | The processing method and mobile terminal of a kind of sectional drawing | |
CN107103224A (en) | A kind of unlocking method and mobile terminal | |
CN106355109A (en) | File encryption method and mobile terminal | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN106709457A (en) | Task execution method based on fingerprint, and mobile terminal | |
CN106557259A (en) | A kind of operational approach and mobile terminal of mobile terminal | |
CN106156600A (en) | The unlocking method of a kind of application program and mobile terminal | |
CN107422970A (en) | A kind of unlocking method and mobile terminal | |
CN106384060A (en) | Mobile terminal data encryption method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180514 Address after: 518101 21 building, customs building, 23 District, Baoan District Xin'an street, Shenzhen, Guangdong. Patentee after: Weaver mobile communications (Shenzhen) Co., Ltd. Address before: 523860 No. 283 BBK Avenue, Changan Town, Changan, Guangdong. Patentee before: VIVO MOBILE COMMUNICATION CO., LTD. |