CN105678137A - Method and device for identity recognition - Google Patents

Method and device for identity recognition Download PDF

Info

Publication number
CN105678137A
CN105678137A CN201410665618.XA CN201410665618A CN105678137A CN 105678137 A CN105678137 A CN 105678137A CN 201410665618 A CN201410665618 A CN 201410665618A CN 105678137 A CN105678137 A CN 105678137A
Authority
CN
China
Prior art keywords
terminal unit
eyeprint
described terminal
application
operation requests
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201410665618.XA
Other languages
Chinese (zh)
Inventor
沙爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410665618.XA priority Critical patent/CN105678137A/en
Priority to PCT/CN2015/083458 priority patent/WO2016078429A1/en
Publication of CN105678137A publication Critical patent/CN105678137A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a method and device for identity recognition. The method is suitable for terminal equipment and comprises following steps: scanning eye patterns of a current user when the terminal equipment is in accord with the pre-set condition; and executing subsequent operation by the terminal equipment when comparison results are consistent. The method and device can guarantee effective recognition of valid users.

Description

A kind of method and apparatus of identification
Technical field
The present invention relates to data security arts, the method and apparatus particularly relating to a kind of identification.
Background technology
Application on the terminal units such as smart mobile phone gets more and more, a lot of application are required for accessing the user data on terminal unit, such as social networking application needs accessing address list, navigation application to need access terminal unit position, authentication class software to need to access Terminal Equipment Identifier, but often user does not recognize that these data of terminal unit are employed to read, and it occur frequently that some application accesses some and self and uncorrelated data, this just provides chance for leaking data.
Additionally, on the terminal device, some data owner is had to only want to be accessed by me, including the data of the aspect such as personal call basis, secret file, social networking application, if can be checked by any user, then be just easy to the social activity to owner, work, money threaten.
Mainly adopting in the industry identity recognizing technology to protect the user data on terminal unit at present, current identification mainly adopts fingerprint mode:
A, fingerprint acquisition mode: carry out the collection of fingerprint mainly by external slidingtype or pressing type fingerprint extracting device;
B, protection to data access: be usually the switch providing privacy mode in arranging menu, by starting privacy mode after finger-mark check, all no longer carry out the identification checking of fingerprint then into other any module.
The shortcoming of prior art existence or problem:
First, there is very big reproducibility in fingerprint recognition, such as: the fingerprint that user retains on screen, can be duplicated into silica gel finger sleeve completely, lack disguise, so the identification of identity is existed certain erroneous judgement risk;
Secondly, currently existing scheme by identifying that fingerprint confirms the identity of owner, thus the operation of follow-up all modules all adopts the processing mode of exploitation, does not accomplish the checking protection of the real time identity to data in arranging menu; In fact being entirely possible to is not now that owner is operating, and results in the non-owner entering high sensitive blocks.
Finally, existing data access Identity Management, it does not have the mechanism of white list, software is once issue, and follow-up upgrading is required for big version updating, and namely consumed flow is also lost time.
Summary of the invention
The technical problem to be solved in the present invention is to provide a set of user identity identification mechanism based on eyeprint, it is ensured that effectively identify validated user.
In order to solve the problems referred to above, a kind of method that the invention provides identification, it is adaptable in terminal unit, including:
Described terminal unit scans the eyeprint of active user when conforming to a predetermined condition;
Described terminal unit is compared scanning the eyeprint characteristic prestored in the eyeprint characteristic and described terminal unit that obtain;
When comparison result is consistent, described terminal unit performs subsequent operation.
Alternatively, described predetermined condition includes:
Receive predetermined operation requests;
When predetermined application is opened, arrive authentication period.
Alternatively, described method also includes:
Described predetermined operation requests or predetermined application is configured by white list.
Alternatively, described method also includes:
When described terminal unit receives operation requests or starts application, described operation requests or application are mated with described white list; Allow when the match is successful to read the eyeprint characteristic prestored in described terminal unit.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is included by described terminal unit:
Described terminal unit searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
Present invention also offers the device of a kind of identification, be arranged in terminal unit, including:
Scan module, for scanning the eyeprint of active user when conforming to a predetermined condition;
Comparison module, compares for the eyeprint characteristic prestored in eyeprint characteristic scanning obtained and described terminal unit;
Perform module, for performing subsequent operation when comparison result is consistent.
Alternatively, described predetermined condition includes:
Described terminal unit receives predetermined operation requests
Predetermined application is opened on described terminal unit, arrive authentication period.
Alternatively, described device also includes:
Configuration module, for configuring described predetermined operation requests or predetermined application by white list.
Alternatively, described configuration module is additionally operable to, when described terminal unit receives operation requests or starts application, described operation requests or application be mated with described white list; Described comparison module is allowed to read the eyeprint characteristic prestored in described terminal unit when the match is successful.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is referred to by described comparison module:
Described comparison module searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
The present invention devises a set of user identity identification mechanism based on eyeprint, not only from unblock aspect cognitron owner identification, and in other all modules being desired with active user identification, eyeprint scanning and checking can be carried out at any time, thus ensure that validated user accesses to specify data.
It addition, protected application and data can also be carried out white list management by the present invention, availability and the motility of the present invention are greatly promoted, and significantly reduce the probability that critical data is stolen.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the method for a kind of identification of the present invention;
Fig. 2 is the schematic flow sheet of one of predetermined condition situation in the present invention;
Fig. 3 is the schematic flow sheet of the two of predetermined condition situation in the present invention;
Fig. 4 is the schematic flow sheet of white list coupling and comparison in the present invention;
Fig. 5 is the schematic diagram of a kind of specific implementation of the present invention;
Fig. 6 is the schematic flow sheet in the specific implementation shown in Fig. 5.
Detailed description of the invention
Below in conjunction with drawings and Examples, technical scheme is described in detail.
If it should be noted that do not conflict, the embodiment of the present invention and each feature in embodiment can be combined with each other, all within protection scope of the present invention. Although it addition, illustrate logical order in flow charts, but in some cases, it is possible to perform shown or described step with the order being different from herein.
A kind of method of identification, it is adaptable in terminal unit, as it is shown in figure 1, include:
Described terminal unit scans the eyeprint of active user when conforming to a predetermined condition;
Described terminal unit is compared scanning the eyeprint characteristic prestored in the eyeprint characteristic and described terminal unit that obtain;
When comparison result is consistent, described terminal unit performs subsequent operation.
Eyeprint identification is the technology that the vein blood vessel for human eyeball is acquired and identifies. The blood vessel of human body is best biometric discrimination method, because blood vessel data is collected in human body, it is impossible to pass into silence, it is also not possible to be replicated. The eyeprint characteristic prestored can only include owner's, it is also possible to includes one or more validated user.
Described predetermined condition can include two kinds:
A kind of is receive predetermined operation requests. This is start the eyeprint of scanning active user when operating, and if not owner or other validated user, then does not allow to be operated; Otherwise perform subsequent operation, namely carry out corresponding operating according to the operation requests of user.
One object lesson is as in figure 2 it is shown, in this example, predetermined operation requests is the application starting and need to verifying user identity, is applied in mobile phone, and validated user only includes owner; This example includes:
201, the application that need to verify user identity is started;
202, start the eyeprint of front-facing camera scanning active user, obtain eyeprint characteristic;
203, the eyeprint characteristic of the owner that mobile phone is pre-recorded is read;
204, whether consistent two groups of eyeprint characteristics are compared; If consistent, identification active user is owner, it is possible to open application; If inconsistent, identify that active user is non-owner, it is not possible to open application.
Described predetermined operation requests can be access tentation data (data specified in such as note, address list, message registration, picture library, some application), starts predetermined application (such as social activity software, file manager), carry out scheduled operation (such as unlock mobile phone, e-Bank payment, transfer accounts) etc., and which predetermined operation requests specifically includes and can be arranged voluntarily by user.
When predetermined operation requests is access the data specified in some application, do not carry out identification when starting application, it is possible to allow any user to open application, but the sensitive data that unauthorized users to access chooses in advance can be stoped, this mode friendly, disguised relatively good.
Another kind is when predetermined application is opened, and arrives authentication period.
This is Real time identification user identity pattern, once open, in the process using application, the eyeprint of meeting timing scan active user, if identifying is disabled user, exits current application; If owner or other validated user then perform subsequent operation, namely continue to run with application, and perform the operation requests that user proposes in this application, until authentication period arrives next time.
One object lesson is as it is shown on figure 3, this example is applied in mobile phone, and validated user only includes owner, and authentication period is 3 minutes; This example includes:
301, application starts to start;
302, judge whether to open real-time detection; If opening, carrying out 303, being not turned on, normally using;
303, every 3 minutes, start the eyeprint of front-facing camera scanning active user, obtain eyeprint characteristic;
304, the eyeprint characteristic of the owner that mobile phone is pre-recorded is read;
305, whether consistent two groups of eyeprint characteristics are compared; If consistent, identification active user is owner, normally uses; If inconsistent, identify that active user is non-owner, point out and exit current application.
Described predetermined application include which, the cycle how long, it is possible to arranged voluntarily by user.
Two kinds of predetermined conditions can each independently from, it is also possible to use together.
The technical program is for the identity of real-time verification active user, when starting application, and use procedure can be carried out real-time user identity verification, thus ensure that only validated user can carry out some operation, such as accesses the data of need for confidentiality, carries out e-Bank payment etc. So can protect significant data, it is prevented that illegal operation, it is ensured that the information security of terminal unit.
The authority accessing data can also be associated with the identification of particular persons by this programme; The algorithm that the element of identification can be stored with data encryption combines, and only could access the data specified through the user of authentication, could by data deciphering; Then cannot access these data without the user identity of authentication, more cannot see the plaintext of these data.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is included by described terminal unit:
Described terminal unit searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
So by the application in cell phone system, user data, identity can be accessed according to different users and carries out stratified management, and different access identity is corresponded to different safe classes.
The program can also adopt eyeprint identification technology to verify the identity of user, when user unlocks mobile phone, it is necessary to gathers the eyeprint feature of user, if identical with the owner's eyeprint feature pre-recorded before in mobile phone, is then identified as owner; If it is not the same, be then identified as non-owner and visitor.
For non-owner user, mobile phone can be that this kind of user identity sets a set of visible application and data in advance, and these data are for being to disclosed in other people, and to be expressly preserve owner;
For owner, major applications and data in mobile phone are all visible, and these data only have owner just can see.
This programme is by based on ARMTrustZone technology, and TrustZone (TM) technology occurs in ARMv6KZ and relatively late application core framework. It provide the scheme of a kind of low cost, for adding exclusive security kernel in system single chip (SoC), the access control mode of hardware construction support two virtual processors. This mode can make application core can switch (generally renaming as field (worlds) to avoid the title with other functional areas to obscure) between two states, and information can be avoided under this framework to leak to more unsafe field from more believable core realm. Switching between this kernel field usually with other functions of processor entirely without relatedness (orthogonal), therefore every field can each independent work but remain to same kernel of use.
Alternatively, said method also includes:
Undertaken configuring described predetermined operation requests or predetermined application by white list.
If shielded operation requests/application is deleted or increases by follow-up needs, it is effective such as through updating white list, not only convenient but also flexible.
Described white list can first pass through aes_cbc_128 encryption, then uses RSA private key signature, and RSA PKI is saved in the hardware register of terminal unit, the data after signature is built in the software system of terminal unit.
Said method also includes: when described terminal unit receives predetermined operation requests or starts predetermined application, described operation requests or application are mated with described white list; Allow when the match is successful to read the eyeprint characteristic prestored in described terminal unit.
As shown in Figure 4, in this example, predetermined condition is start predetermined application to one example of white list verification and coupling; Including:
301, application is started;
302, judge whether to need inspection white list; If need not, directly open application, it is necessary to then mate in white list (being protected list of application by eyeprint);
303, judge whether the application to start belongs to shielded application, if yes then enter the flow process of Fig. 2; If not then normally opening application.
White list in step 302 is obtained by below scheme:
A, from depositor read RSA PKI;
B, use RSA PKI verification white list data, then decipher with aes_cbc_128;
C, obtain original white list.
In the verification and coupling flow process of white list, it is also possible to relevant PKI is saved in common Flash memory space, but the access in this region is all application to be shared, and there is the risk accessed by other application.
For the classification of protected operation, application, it is managed by white list, both can increase the extensibility of protection object list, can ensure that again the effectiveness of management.
Implementing of such scheme can be as shown in Figure 5, an embedded security module in applications client, this security module uses the unique key of each application to sign in advance, after at this, application starts, when relating to access eyeprint characteristic, security module calls the packaged interface of terminal unit to access shielded eyeprint characteristic;
When applications client access interface, terminal unit will to application identity be verified, main flow as shown in Figure 6, including:
601, the application needing identification is started;
602, different ID is specified for each application; Hardware keys is read from depositor;
603, unique identification key is generated for application;
604, when applying reading machine dominant eye stricture of vagina characteristic, it may be judged whether for valid application; If it is eyeprint characteristic can be accessed; If not then accessing.
Mark owing to verifying user identity is extremely important, and eyeprint characteristic is saved in special area by the program, and the access rights in this region adopt the key preserved in a register to be verified. The memory area of identity is isolated with general data physically; greatly reduce the probability stolen by wooden horse and malicious virus and distort; and from access mechanism, increase authentication measures; ensure that the application of only legal identity can run and access, the correctness of identity and the protection of data safety is all very meaningful.
The device of a kind of identification, is arranged in terminal unit, including:
Scan module, for scanning the eyeprint of active user when conforming to a predetermined condition;
Comparison module, compares for the eyeprint characteristic prestored in eyeprint characteristic scanning obtained and described terminal unit;
Perform module, for performing subsequent operation when comparison result is consistent.
Alternatively, described predetermined condition includes:
Described terminal unit receives predetermined operation requests
Predetermined application is opened on described terminal unit, arrive authentication period.
Alternatively, described device also includes:
Configuration module, for configuring described predetermined operation requests or predetermined application by white list.
Alternatively, described configuration module is additionally operable to, when described terminal unit receives operation requests or starts application, described operation requests or application be mated with described white list; Described comparison module is allowed to read the eyeprint characteristic prestored in described terminal unit when the match is successful.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is referred to by described comparison module:
Described comparison module searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
Certainly; the present invention also can have other various embodiments; when without departing substantially from present invention spirit and essence thereof; those of ordinary skill in the art are when can make various corresponding change and deformation according to the present invention, but these change accordingly and deform the scope of the claims that all should belong to the present invention.

Claims (10)

1. the method for an identification, it is adaptable in terminal unit, including:
Described terminal unit scans the eyeprint of active user when conforming to a predetermined condition;
Described terminal unit is compared scanning the eyeprint characteristic prestored in the eyeprint characteristic and described terminal unit that obtain;
When comparison result is consistent, described terminal unit performs subsequent operation.
2. the method for claim 1, it is characterised in that described predetermined condition includes:
Receive predetermined operation requests;
When predetermined application is opened, arrive authentication period.
3. method as claimed in claim 2, it is characterised in that also include:
Described predetermined operation requests or predetermined application is configured by white list.
4. method as claimed in claim 3, it is characterised in that also include:
When described terminal unit receives operation requests or starts application, described operation requests or application are mated with described white list; Allow when the match is successful to read the eyeprint characteristic prestored in described terminal unit.
5. method according to any one of claims 1 to 4, it is characterised in that:
Described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is included by described terminal unit:
Described terminal unit searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
6. a device for identification, is arranged in terminal unit, it is characterised in that including:
Scan module, for scanning the eyeprint of active user when conforming to a predetermined condition;
Comparison module, compares for the eyeprint characteristic prestored in eyeprint characteristic scanning obtained and described terminal unit;
Perform module, for performing subsequent operation when comparison result is consistent.
7. device as claimed in claim 6, it is characterised in that described predetermined condition includes:
Described terminal unit receives predetermined operation requests
Predetermined application is opened on described terminal unit, arrive authentication period.
8. device as claimed in claim 7, it is characterised in that also include:
Configuration module, for configuring described predetermined operation requests or predetermined application by white list.
9. device as claimed in claim 8, it is characterised in that:
Described configuration module is additionally operable to, when described terminal unit receives operation requests or starts application, described operation requests or application be mated with described white list; Described comparison module is allowed to read the eyeprint characteristic prestored in described terminal unit when the match is successful.
10. the device as according to any one of claim 6~9, it is characterised in that:
Described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is referred to by described comparison module:
Described comparison module searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
CN201410665618.XA 2014-11-19 2014-11-19 Method and device for identity recognition Withdrawn CN105678137A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410665618.XA CN105678137A (en) 2014-11-19 2014-11-19 Method and device for identity recognition
PCT/CN2015/083458 WO2016078429A1 (en) 2014-11-19 2015-07-07 Identity recognition method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410665618.XA CN105678137A (en) 2014-11-19 2014-11-19 Method and device for identity recognition

Publications (1)

Publication Number Publication Date
CN105678137A true CN105678137A (en) 2016-06-15

Family

ID=56013238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410665618.XA Withdrawn CN105678137A (en) 2014-11-19 2014-11-19 Method and device for identity recognition

Country Status (2)

Country Link
CN (1) CN105678137A (en)
WO (1) WO2016078429A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145772A (en) * 2017-04-12 2017-09-08 广东欧珀移动通信有限公司 Terminal device security control method, device and terminal device
CN108922114A (en) * 2018-06-22 2018-11-30 张小勇 Security monitor method and system
US10467490B2 (en) 2016-08-24 2019-11-05 Alibaba Group Holding Limited User identity verification method, apparatus and system
CN110674486A (en) * 2019-09-25 2020-01-10 珠海格力电器股份有限公司 Terminal security control method, storage medium and terminal equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319830A (en) * 2017-01-17 2018-07-24 中兴通讯股份有限公司 A kind of auth method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101517615A (en) * 2006-09-29 2009-08-26 冲电气工业株式会社 Personal authentication system and personal authentication method
CN102158595A (en) * 2011-02-16 2011-08-17 中兴通讯股份有限公司 Method and device for realizing burglary prevention of mobile terminal by face recognition
CN102592099A (en) * 2011-01-14 2012-07-18 启碁科技股份有限公司 Security identification method and electronic device thereof
CN103390153A (en) * 2012-08-10 2013-11-13 眼验有限责任公司 Method and system of texture features for biometric authentication
CN103577801A (en) * 2012-08-10 2014-02-12 眼验有限责任公司 Quality metrics method and system for biometric authentication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003308130A (en) * 2002-04-15 2003-10-31 Matsushita Electric Ind Co Ltd Information device
US7327860B2 (en) * 2005-05-04 2008-02-05 West Virginia University Conjunctival scans for personal identification
CN104778396B (en) * 2015-04-29 2019-01-29 惠州Tcl移动通信有限公司 A kind of eyeprint identification unlocking method and system based on environmental screening frame
CN104834852B (en) * 2015-05-04 2018-07-13 惠州Tcl移动通信有限公司 A kind of method and system that mobile terminal is unlocked based on high quality eyeprint image

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101517615A (en) * 2006-09-29 2009-08-26 冲电气工业株式会社 Personal authentication system and personal authentication method
CN102592099A (en) * 2011-01-14 2012-07-18 启碁科技股份有限公司 Security identification method and electronic device thereof
CN102158595A (en) * 2011-02-16 2011-08-17 中兴通讯股份有限公司 Method and device for realizing burglary prevention of mobile terminal by face recognition
CN103390153A (en) * 2012-08-10 2013-11-13 眼验有限责任公司 Method and system of texture features for biometric authentication
CN103577801A (en) * 2012-08-10 2014-02-12 眼验有限责任公司 Quality metrics method and system for biometric authentication

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10467490B2 (en) 2016-08-24 2019-11-05 Alibaba Group Holding Limited User identity verification method, apparatus and system
TWI687879B (en) * 2016-08-24 2020-03-11 香港商阿里巴巴集團服務有限公司 Server, client, user verification method and system
US10997443B2 (en) 2016-08-24 2021-05-04 Advanced New Technologies Co., Ltd. User identity verification method, apparatus and system
CN107145772A (en) * 2017-04-12 2017-09-08 广东欧珀移动通信有限公司 Terminal device security control method, device and terminal device
CN107145772B (en) * 2017-04-12 2020-01-10 Oppo广东移动通信有限公司 Terminal equipment security control method and device and terminal equipment
CN108922114A (en) * 2018-06-22 2018-11-30 张小勇 Security monitor method and system
CN110674486A (en) * 2019-09-25 2020-01-10 珠海格力电器股份有限公司 Terminal security control method, storage medium and terminal equipment

Also Published As

Publication number Publication date
WO2016078429A1 (en) 2016-05-26

Similar Documents

Publication Publication Date Title
JP7182924B2 (en) Mobile security measures
KR102531418B1 (en) Secure biometric data capture, processing and management
CN105429761B (en) A kind of key generation method and device
CN107832670B (en) Face recognition method and related product
US6775776B1 (en) Biometric-based authentication in a nonvolatile memory device
US10788984B2 (en) Method, device, and system for displaying user interface
CN107004074A (en) The technology of enhanced user certification is carried out using advanced sensors monitoring
Jo et al. Security analysis and improvement of fingerprint authentication for smartphones
CN105678137A (en) Method and device for identity recognition
US11496471B2 (en) Mobile enrollment using a known biometric
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
CN106161028A (en) Safety chip, communication terminal and the method improving communication security
WO2017067507A1 (en) Method and device for determining a use permission of an apparatus
CN111131202A (en) Identity authentication method and system based on multiple information authentication
CN107609368A (en) Safety protecting method, device, equipment and the computer-readable storage medium of application program
CN106156577A (en) A kind of safety chip, authentication method based on biological characteristic and intelligent terminal
CN109886662A (en) Block chain wallet application method and system, terminal and computer readable storage medium
AU2013205126A1 (en) Facial recognition streamlined login
CN112334896B (en) Unlocking method and equipment of terminal equipment and storage medium
CN113158154A (en) Mobile device, verification terminal device and identity verification method
Sanchez-Reillo et al. Strengths, weaknesses and recommendations in implementing biometrics in mobile devices
KR20190061606A (en) Method and system for protecting personal information infringement using division of authentication process and biometrics authentication
KR101885733B1 (en) Biometric authentication apparatus and user authentication method using biometric authentication apparatus
US11869294B2 (en) Providing digital identifications generated for checkpoint validation based on biometric identification
Apostol et al. Android Fingerprint Sensor: Pitfalls and Challenges

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20160615