CN105678137A - Method and device for identity recognition - Google Patents
Method and device for identity recognition Download PDFInfo
- Publication number
- CN105678137A CN105678137A CN201410665618.XA CN201410665618A CN105678137A CN 105678137 A CN105678137 A CN 105678137A CN 201410665618 A CN201410665618 A CN 201410665618A CN 105678137 A CN105678137 A CN 105678137A
- Authority
- CN
- China
- Prior art keywords
- terminal unit
- eyeprint
- described terminal
- application
- operation requests
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000005516 engineering process Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 210000004204 blood vessel Anatomy 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 208000031481 Pathologic Constriction Diseases 0.000 description 1
- VYPSYNLAJGMNEJ-UHFFFAOYSA-N Silicium dioxide Chemical compound O=[Si]=O VYPSYNLAJGMNEJ-UHFFFAOYSA-N 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 210000005252 bulbus oculi Anatomy 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012850 discrimination method Methods 0.000 description 1
- 210000001508 eye Anatomy 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000004899 motility Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011897 real-time detection Methods 0.000 description 1
- 239000000741 silica gel Substances 0.000 description 1
- 229910002027 silica gel Inorganic materials 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 210000001215 vagina Anatomy 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides a method and device for identity recognition. The method is suitable for terminal equipment and comprises following steps: scanning eye patterns of a current user when the terminal equipment is in accord with the pre-set condition; and executing subsequent operation by the terminal equipment when comparison results are consistent. The method and device can guarantee effective recognition of valid users.
Description
Technical field
The present invention relates to data security arts, the method and apparatus particularly relating to a kind of identification.
Background technology
Application on the terminal units such as smart mobile phone gets more and more, a lot of application are required for accessing the user data on terminal unit, such as social networking application needs accessing address list, navigation application to need access terminal unit position, authentication class software to need to access Terminal Equipment Identifier, but often user does not recognize that these data of terminal unit are employed to read, and it occur frequently that some application accesses some and self and uncorrelated data, this just provides chance for leaking data.
Additionally, on the terminal device, some data owner is had to only want to be accessed by me, including the data of the aspect such as personal call basis, secret file, social networking application, if can be checked by any user, then be just easy to the social activity to owner, work, money threaten.
Mainly adopting in the industry identity recognizing technology to protect the user data on terminal unit at present, current identification mainly adopts fingerprint mode:
A, fingerprint acquisition mode: carry out the collection of fingerprint mainly by external slidingtype or pressing type fingerprint extracting device;
B, protection to data access: be usually the switch providing privacy mode in arranging menu, by starting privacy mode after finger-mark check, all no longer carry out the identification checking of fingerprint then into other any module.
The shortcoming of prior art existence or problem:
First, there is very big reproducibility in fingerprint recognition, such as: the fingerprint that user retains on screen, can be duplicated into silica gel finger sleeve completely, lack disguise, so the identification of identity is existed certain erroneous judgement risk;
Secondly, currently existing scheme by identifying that fingerprint confirms the identity of owner, thus the operation of follow-up all modules all adopts the processing mode of exploitation, does not accomplish the checking protection of the real time identity to data in arranging menu; In fact being entirely possible to is not now that owner is operating, and results in the non-owner entering high sensitive blocks.
Finally, existing data access Identity Management, it does not have the mechanism of white list, software is once issue, and follow-up upgrading is required for big version updating, and namely consumed flow is also lost time.
Summary of the invention
The technical problem to be solved in the present invention is to provide a set of user identity identification mechanism based on eyeprint, it is ensured that effectively identify validated user.
In order to solve the problems referred to above, a kind of method that the invention provides identification, it is adaptable in terminal unit, including:
Described terminal unit scans the eyeprint of active user when conforming to a predetermined condition;
Described terminal unit is compared scanning the eyeprint characteristic prestored in the eyeprint characteristic and described terminal unit that obtain;
When comparison result is consistent, described terminal unit performs subsequent operation.
Alternatively, described predetermined condition includes:
Receive predetermined operation requests;
When predetermined application is opened, arrive authentication period.
Alternatively, described method also includes:
Described predetermined operation requests or predetermined application is configured by white list.
Alternatively, described method also includes:
When described terminal unit receives operation requests or starts application, described operation requests or application are mated with described white list; Allow when the match is successful to read the eyeprint characteristic prestored in described terminal unit.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is included by described terminal unit:
Described terminal unit searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
Present invention also offers the device of a kind of identification, be arranged in terminal unit, including:
Scan module, for scanning the eyeprint of active user when conforming to a predetermined condition;
Comparison module, compares for the eyeprint characteristic prestored in eyeprint characteristic scanning obtained and described terminal unit;
Perform module, for performing subsequent operation when comparison result is consistent.
Alternatively, described predetermined condition includes:
Described terminal unit receives predetermined operation requests
Predetermined application is opened on described terminal unit, arrive authentication period.
Alternatively, described device also includes:
Configuration module, for configuring described predetermined operation requests or predetermined application by white list.
Alternatively, described configuration module is additionally operable to, when described terminal unit receives operation requests or starts application, described operation requests or application be mated with described white list; Described comparison module is allowed to read the eyeprint characteristic prestored in described terminal unit when the match is successful.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is referred to by described comparison module:
Described comparison module searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
The present invention devises a set of user identity identification mechanism based on eyeprint, not only from unblock aspect cognitron owner identification, and in other all modules being desired with active user identification, eyeprint scanning and checking can be carried out at any time, thus ensure that validated user accesses to specify data.
It addition, protected application and data can also be carried out white list management by the present invention, availability and the motility of the present invention are greatly promoted, and significantly reduce the probability that critical data is stolen.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the method for a kind of identification of the present invention;
Fig. 2 is the schematic flow sheet of one of predetermined condition situation in the present invention;
Fig. 3 is the schematic flow sheet of the two of predetermined condition situation in the present invention;
Fig. 4 is the schematic flow sheet of white list coupling and comparison in the present invention;
Fig. 5 is the schematic diagram of a kind of specific implementation of the present invention;
Fig. 6 is the schematic flow sheet in the specific implementation shown in Fig. 5.
Detailed description of the invention
Below in conjunction with drawings and Examples, technical scheme is described in detail.
If it should be noted that do not conflict, the embodiment of the present invention and each feature in embodiment can be combined with each other, all within protection scope of the present invention. Although it addition, illustrate logical order in flow charts, but in some cases, it is possible to perform shown or described step with the order being different from herein.
A kind of method of identification, it is adaptable in terminal unit, as it is shown in figure 1, include:
Described terminal unit scans the eyeprint of active user when conforming to a predetermined condition;
Described terminal unit is compared scanning the eyeprint characteristic prestored in the eyeprint characteristic and described terminal unit that obtain;
When comparison result is consistent, described terminal unit performs subsequent operation.
Eyeprint identification is the technology that the vein blood vessel for human eyeball is acquired and identifies. The blood vessel of human body is best biometric discrimination method, because blood vessel data is collected in human body, it is impossible to pass into silence, it is also not possible to be replicated. The eyeprint characteristic prestored can only include owner's, it is also possible to includes one or more validated user.
Described predetermined condition can include two kinds:
A kind of is receive predetermined operation requests. This is start the eyeprint of scanning active user when operating, and if not owner or other validated user, then does not allow to be operated; Otherwise perform subsequent operation, namely carry out corresponding operating according to the operation requests of user.
One object lesson is as in figure 2 it is shown, in this example, predetermined operation requests is the application starting and need to verifying user identity, is applied in mobile phone, and validated user only includes owner; This example includes:
201, the application that need to verify user identity is started;
202, start the eyeprint of front-facing camera scanning active user, obtain eyeprint characteristic;
203, the eyeprint characteristic of the owner that mobile phone is pre-recorded is read;
204, whether consistent two groups of eyeprint characteristics are compared; If consistent, identification active user is owner, it is possible to open application; If inconsistent, identify that active user is non-owner, it is not possible to open application.
Described predetermined operation requests can be access tentation data (data specified in such as note, address list, message registration, picture library, some application), starts predetermined application (such as social activity software, file manager), carry out scheduled operation (such as unlock mobile phone, e-Bank payment, transfer accounts) etc., and which predetermined operation requests specifically includes and can be arranged voluntarily by user.
When predetermined operation requests is access the data specified in some application, do not carry out identification when starting application, it is possible to allow any user to open application, but the sensitive data that unauthorized users to access chooses in advance can be stoped, this mode friendly, disguised relatively good.
Another kind is when predetermined application is opened, and arrives authentication period.
This is Real time identification user identity pattern, once open, in the process using application, the eyeprint of meeting timing scan active user, if identifying is disabled user, exits current application; If owner or other validated user then perform subsequent operation, namely continue to run with application, and perform the operation requests that user proposes in this application, until authentication period arrives next time.
One object lesson is as it is shown on figure 3, this example is applied in mobile phone, and validated user only includes owner, and authentication period is 3 minutes; This example includes:
301, application starts to start;
302, judge whether to open real-time detection; If opening, carrying out 303, being not turned on, normally using;
303, every 3 minutes, start the eyeprint of front-facing camera scanning active user, obtain eyeprint characteristic;
304, the eyeprint characteristic of the owner that mobile phone is pre-recorded is read;
305, whether consistent two groups of eyeprint characteristics are compared; If consistent, identification active user is owner, normally uses; If inconsistent, identify that active user is non-owner, point out and exit current application.
Described predetermined application include which, the cycle how long, it is possible to arranged voluntarily by user.
Two kinds of predetermined conditions can each independently from, it is also possible to use together.
The technical program is for the identity of real-time verification active user, when starting application, and use procedure can be carried out real-time user identity verification, thus ensure that only validated user can carry out some operation, such as accesses the data of need for confidentiality, carries out e-Bank payment etc. So can protect significant data, it is prevented that illegal operation, it is ensured that the information security of terminal unit.
The authority accessing data can also be associated with the identification of particular persons by this programme; The algorithm that the element of identification can be stored with data encryption combines, and only could access the data specified through the user of authentication, could by data deciphering; Then cannot access these data without the user identity of authentication, more cannot see the plaintext of these data.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is included by described terminal unit:
Described terminal unit searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
So by the application in cell phone system, user data, identity can be accessed according to different users and carries out stratified management, and different access identity is corresponded to different safe classes.
The program can also adopt eyeprint identification technology to verify the identity of user, when user unlocks mobile phone, it is necessary to gathers the eyeprint feature of user, if identical with the owner's eyeprint feature pre-recorded before in mobile phone, is then identified as owner; If it is not the same, be then identified as non-owner and visitor.
For non-owner user, mobile phone can be that this kind of user identity sets a set of visible application and data in advance, and these data are for being to disclosed in other people, and to be expressly preserve owner;
For owner, major applications and data in mobile phone are all visible, and these data only have owner just can see.
This programme is by based on ARMTrustZone technology, and TrustZone (TM) technology occurs in ARMv6KZ and relatively late application core framework. It provide the scheme of a kind of low cost, for adding exclusive security kernel in system single chip (SoC), the access control mode of hardware construction support two virtual processors. This mode can make application core can switch (generally renaming as field (worlds) to avoid the title with other functional areas to obscure) between two states, and information can be avoided under this framework to leak to more unsafe field from more believable core realm. Switching between this kernel field usually with other functions of processor entirely without relatedness (orthogonal), therefore every field can each independent work but remain to same kernel of use.
Alternatively, said method also includes:
Undertaken configuring described predetermined operation requests or predetermined application by white list.
If shielded operation requests/application is deleted or increases by follow-up needs, it is effective such as through updating white list, not only convenient but also flexible.
Described white list can first pass through aes_cbc_128 encryption, then uses RSA private key signature, and RSA PKI is saved in the hardware register of terminal unit, the data after signature is built in the software system of terminal unit.
Said method also includes: when described terminal unit receives predetermined operation requests or starts predetermined application, described operation requests or application are mated with described white list; Allow when the match is successful to read the eyeprint characteristic prestored in described terminal unit.
As shown in Figure 4, in this example, predetermined condition is start predetermined application to one example of white list verification and coupling; Including:
301, application is started;
302, judge whether to need inspection white list; If need not, directly open application, it is necessary to then mate in white list (being protected list of application by eyeprint);
303, judge whether the application to start belongs to shielded application, if yes then enter the flow process of Fig. 2; If not then normally opening application.
White list in step 302 is obtained by below scheme:
A, from depositor read RSA PKI;
B, use RSA PKI verification white list data, then decipher with aes_cbc_128;
C, obtain original white list.
In the verification and coupling flow process of white list, it is also possible to relevant PKI is saved in common Flash memory space, but the access in this region is all application to be shared, and there is the risk accessed by other application.
For the classification of protected operation, application, it is managed by white list, both can increase the extensibility of protection object list, can ensure that again the effectiveness of management.
Implementing of such scheme can be as shown in Figure 5, an embedded security module in applications client, this security module uses the unique key of each application to sign in advance, after at this, application starts, when relating to access eyeprint characteristic, security module calls the packaged interface of terminal unit to access shielded eyeprint characteristic;
When applications client access interface, terminal unit will to application identity be verified, main flow as shown in Figure 6, including:
601, the application needing identification is started;
602, different ID is specified for each application; Hardware keys is read from depositor;
603, unique identification key is generated for application;
604, when applying reading machine dominant eye stricture of vagina characteristic, it may be judged whether for valid application; If it is eyeprint characteristic can be accessed; If not then accessing.
Mark owing to verifying user identity is extremely important, and eyeprint characteristic is saved in special area by the program, and the access rights in this region adopt the key preserved in a register to be verified. The memory area of identity is isolated with general data physically; greatly reduce the probability stolen by wooden horse and malicious virus and distort; and from access mechanism, increase authentication measures; ensure that the application of only legal identity can run and access, the correctness of identity and the protection of data safety is all very meaningful.
The device of a kind of identification, is arranged in terminal unit, including:
Scan module, for scanning the eyeprint of active user when conforming to a predetermined condition;
Comparison module, compares for the eyeprint characteristic prestored in eyeprint characteristic scanning obtained and described terminal unit;
Perform module, for performing subsequent operation when comparison result is consistent.
Alternatively, described predetermined condition includes:
Described terminal unit receives predetermined operation requests
Predetermined application is opened on described terminal unit, arrive authentication period.
Alternatively, described device also includes:
Configuration module, for configuring described predetermined operation requests or predetermined application by white list.
Alternatively, described configuration module is additionally operable to, when described terminal unit receives operation requests or starts application, described operation requests or application be mated with described white list; Described comparison module is allowed to read the eyeprint characteristic prestored in described terminal unit when the match is successful.
Alternatively, described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is referred to by described comparison module:
Described comparison module searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
Certainly; the present invention also can have other various embodiments; when without departing substantially from present invention spirit and essence thereof; those of ordinary skill in the art are when can make various corresponding change and deformation according to the present invention, but these change accordingly and deform the scope of the claims that all should belong to the present invention.
Claims (10)
1. the method for an identification, it is adaptable in terminal unit, including:
Described terminal unit scans the eyeprint of active user when conforming to a predetermined condition;
Described terminal unit is compared scanning the eyeprint characteristic prestored in the eyeprint characteristic and described terminal unit that obtain;
When comparison result is consistent, described terminal unit performs subsequent operation.
2. the method for claim 1, it is characterised in that described predetermined condition includes:
Receive predetermined operation requests;
When predetermined application is opened, arrive authentication period.
3. method as claimed in claim 2, it is characterised in that also include:
Described predetermined operation requests or predetermined application is configured by white list.
4. method as claimed in claim 3, it is characterised in that also include:
When described terminal unit receives operation requests or starts application, described operation requests or application are mated with described white list; Allow when the match is successful to read the eyeprint characteristic prestored in described terminal unit.
5. method according to any one of claims 1 to 4, it is characterised in that:
Described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is included by described terminal unit:
Described terminal unit searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
6. a device for identification, is arranged in terminal unit, it is characterised in that including:
Scan module, for scanning the eyeprint of active user when conforming to a predetermined condition;
Comparison module, compares for the eyeprint characteristic prestored in eyeprint characteristic scanning obtained and described terminal unit;
Perform module, for performing subsequent operation when comparison result is consistent.
7. device as claimed in claim 6, it is characterised in that described predetermined condition includes:
Described terminal unit receives predetermined operation requests
Predetermined application is opened on described terminal unit, arrive authentication period.
8. device as claimed in claim 7, it is characterised in that also include:
Configuration module, for configuring described predetermined operation requests or predetermined application by white list.
9. device as claimed in claim 8, it is characterised in that:
Described configuration module is additionally operable to, when described terminal unit receives operation requests or starts application, described operation requests or application be mated with described white list; Described comparison module is allowed to read the eyeprint characteristic prestored in described terminal unit when the match is successful.
10. the device as according to any one of claim 6~9, it is characterised in that:
Described predetermined condition and the eyeprint characteristic prestored all include multiple, correspond respectively to different safe classes;
The eyeprint characteristic prestored in the eyeprint characteristic that obtains of scanning and described terminal unit is compared and is referred to by described comparison module:
Described comparison module searches the safe class that the predetermined condition met is corresponding, obtains the eyeprint characteristic prestored that this safe class is corresponding; The eyeprint characteristic and the acquired eyeprint characteristics that obtain scanning are compared.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410665618.XA CN105678137A (en) | 2014-11-19 | 2014-11-19 | Method and device for identity recognition |
PCT/CN2015/083458 WO2016078429A1 (en) | 2014-11-19 | 2015-07-07 | Identity recognition method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410665618.XA CN105678137A (en) | 2014-11-19 | 2014-11-19 | Method and device for identity recognition |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105678137A true CN105678137A (en) | 2016-06-15 |
Family
ID=56013238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410665618.XA Withdrawn CN105678137A (en) | 2014-11-19 | 2014-11-19 | Method and device for identity recognition |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105678137A (en) |
WO (1) | WO2016078429A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107145772A (en) * | 2017-04-12 | 2017-09-08 | 广东欧珀移动通信有限公司 | Terminal device security control method, device and terminal device |
CN108922114A (en) * | 2018-06-22 | 2018-11-30 | 张小勇 | Security monitor method and system |
US10467490B2 (en) | 2016-08-24 | 2019-11-05 | Alibaba Group Holding Limited | User identity verification method, apparatus and system |
CN110674486A (en) * | 2019-09-25 | 2020-01-10 | 珠海格力电器股份有限公司 | Terminal security control method, storage medium and terminal equipment |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108319830A (en) * | 2017-01-17 | 2018-07-24 | 中兴通讯股份有限公司 | A kind of auth method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101517615A (en) * | 2006-09-29 | 2009-08-26 | 冲电气工业株式会社 | Personal authentication system and personal authentication method |
CN102158595A (en) * | 2011-02-16 | 2011-08-17 | 中兴通讯股份有限公司 | Method and device for realizing burglary prevention of mobile terminal by face recognition |
CN102592099A (en) * | 2011-01-14 | 2012-07-18 | 启碁科技股份有限公司 | Security identification method and electronic device thereof |
CN103390153A (en) * | 2012-08-10 | 2013-11-13 | 眼验有限责任公司 | Method and system of texture features for biometric authentication |
CN103577801A (en) * | 2012-08-10 | 2014-02-12 | 眼验有限责任公司 | Quality metrics method and system for biometric authentication |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003308130A (en) * | 2002-04-15 | 2003-10-31 | Matsushita Electric Ind Co Ltd | Information device |
US7327860B2 (en) * | 2005-05-04 | 2008-02-05 | West Virginia University | Conjunctival scans for personal identification |
CN104778396B (en) * | 2015-04-29 | 2019-01-29 | 惠州Tcl移动通信有限公司 | A kind of eyeprint identification unlocking method and system based on environmental screening frame |
CN104834852B (en) * | 2015-05-04 | 2018-07-13 | 惠州Tcl移动通信有限公司 | A kind of method and system that mobile terminal is unlocked based on high quality eyeprint image |
-
2014
- 2014-11-19 CN CN201410665618.XA patent/CN105678137A/en not_active Withdrawn
-
2015
- 2015-07-07 WO PCT/CN2015/083458 patent/WO2016078429A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101517615A (en) * | 2006-09-29 | 2009-08-26 | 冲电气工业株式会社 | Personal authentication system and personal authentication method |
CN102592099A (en) * | 2011-01-14 | 2012-07-18 | 启碁科技股份有限公司 | Security identification method and electronic device thereof |
CN102158595A (en) * | 2011-02-16 | 2011-08-17 | 中兴通讯股份有限公司 | Method and device for realizing burglary prevention of mobile terminal by face recognition |
CN103390153A (en) * | 2012-08-10 | 2013-11-13 | 眼验有限责任公司 | Method and system of texture features for biometric authentication |
CN103577801A (en) * | 2012-08-10 | 2014-02-12 | 眼验有限责任公司 | Quality metrics method and system for biometric authentication |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10467490B2 (en) | 2016-08-24 | 2019-11-05 | Alibaba Group Holding Limited | User identity verification method, apparatus and system |
TWI687879B (en) * | 2016-08-24 | 2020-03-11 | 香港商阿里巴巴集團服務有限公司 | Server, client, user verification method and system |
US10997443B2 (en) | 2016-08-24 | 2021-05-04 | Advanced New Technologies Co., Ltd. | User identity verification method, apparatus and system |
CN107145772A (en) * | 2017-04-12 | 2017-09-08 | 广东欧珀移动通信有限公司 | Terminal device security control method, device and terminal device |
CN107145772B (en) * | 2017-04-12 | 2020-01-10 | Oppo广东移动通信有限公司 | Terminal equipment security control method and device and terminal equipment |
CN108922114A (en) * | 2018-06-22 | 2018-11-30 | 张小勇 | Security monitor method and system |
CN110674486A (en) * | 2019-09-25 | 2020-01-10 | 珠海格力电器股份有限公司 | Terminal security control method, storage medium and terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2016078429A1 (en) | 2016-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7182924B2 (en) | Mobile security measures | |
KR102531418B1 (en) | Secure biometric data capture, processing and management | |
CN105429761B (en) | A kind of key generation method and device | |
US6775776B1 (en) | Biometric-based authentication in a nonvolatile memory device | |
US10788984B2 (en) | Method, device, and system for displaying user interface | |
CN107004074A (en) | The technology of enhanced user certification is carried out using advanced sensors monitoring | |
US11997087B2 (en) | Mobile enrollment using a known biometric | |
CN105678137A (en) | Method and device for identity recognition | |
CN109117616B (en) | Verification method and device, electronic equipment and computer readable storage medium | |
CN106161028A (en) | Safety chip, communication terminal and the method improving communication security | |
CN111131202A (en) | Identity authentication method and system based on multiple information authentication | |
WO2017067507A1 (en) | Method and device for determining a use permission of an apparatus | |
CN106156577A (en) | A kind of safety chip, authentication method based on biological characteristic and intelligent terminal | |
CN112334896B (en) | Unlocking method and equipment of terminal equipment and storage medium | |
CN113158154A (en) | Mobile device, verification terminal device and identity verification method | |
CN109886662A (en) | Block chain wallet application method and system, terminal and computer readable storage medium | |
AU2013205126A1 (en) | Facial recognition streamlined login | |
US12118843B2 (en) | Providing digital identifications generated for checkpoint validation based on biometric identification | |
Sanchez-Reillo et al. | Strengths, weaknesses and recommendations in implementing biometrics in mobile devices | |
US12028349B2 (en) | Protecting physical locations with continuous multi-factor authentication systems | |
KR20190061606A (en) | Method and system for protecting personal information infringement using division of authentication process and biometrics authentication | |
CN107786341B (en) | Certificate loading method and mobile terminal and computer readable storage medium | |
CN114519892A (en) | Challenge-response method for biometric authentication | |
Apostol et al. | Android Fingerprint Sensor: Pitfalls and Challenges | |
US20240257559A1 (en) | Biometric image liveness detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20160615 |
|
WW01 | Invention patent application withdrawn after publication |