CN106295285A - A kind of information processing method and electronic equipment - Google Patents
A kind of information processing method and electronic equipment Download PDFInfo
- Publication number
- CN106295285A CN106295285A CN201510284827.4A CN201510284827A CN106295285A CN 106295285 A CN106295285 A CN 106295285A CN 201510284827 A CN201510284827 A CN 201510284827A CN 106295285 A CN106295285 A CN 106295285A
- Authority
- CN
- China
- Prior art keywords
- electronic equipment
- confirmed
- identity
- operation requests
- control unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of information processing method and electronic equipment, wherein, described information processing method, for processing the authentication of the operation requests for electronic equipment, described method includes: obtain initial identity information;Via identity information initial described in the first control unit pretreatment to produce identity data to be confirmed;Via the more described identity data to be confirmed of secure processing units and described preset data template, generate comparative result;Receive described comparative result via the second control unit, and judge whether according to this to respond described operation requests.
Description
Technical field
The present invention relates to mechanics of communication, particularly relate to a kind of information processing method and electronic equipment.
Background technology
Present inventor, during realizing the embodiment of the present application technical scheme, at least finds correlation technique
The following technical problem of middle existence:
Biological identification technology by the most integrated, is liked by user on the mobile apparatus deeply.Biological identification technology
May be used for intelligent unlocking, intelligence start etc. relates to privacy of user and the checking of safety.A kind of bio-identification
Technology is fingerprint qualification program (fingerprint), existing fingerprint, and it realizes the problem that technology exists
It is: 1) use the very easy user's malice of being pretended of fingerprint of software engineering realization to crack, thus nothing
The privacy of method protection user and safety;2) fingerprint using software engineering to realize needs to introduce extra
Separate hardware realizes, and increases cost.
But, in correlation technique, for this problem, there is no effective solution.
Summary of the invention
In view of this, the embodiment of the present invention, desirable to provide a kind of information processing method and electronic equipment, at least solves
The problem that prior art of having determined exists.
The technical scheme of the embodiment of the present invention is achieved in that
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment
Authentication, described method includes:
Obtain initial identity information;
Via identity information initial described in the first control unit pretreatment to produce identity data to be confirmed;
Via the more described identity data to be confirmed of secure processing units and described preset data template, generate ratio
Relatively result;
Receive described comparative result via the second control unit, and judge whether according to this to respond described operation requests.
In such scheme, described method also includes:
Described identity data to be confirmed is transferred to institute by safe encryption hardware interface by described first control unit
State secure processing units.
In such scheme, described default with described via the more described identity data to be confirmed of secure processing units
Data template, generates comparative result, including:
Relatively described identity data to be confirmed and described preset data template, generate described identity data to be confirmed
Whether it is believable authentication result.
In such scheme, described via the second control unit described comparative result of reception, and judge whether according to this
Respond described operation requests, including:
When described comparative result is described believable authentication result, it is judged that for the operation of electronic equipment
Request is initiated by user trusty, responds described operation requests, opens and has with user's identity
The authority closed processes.
In such scheme, described via the second control unit described comparative result of reception, and judge whether according to this
Respond described operation requests, including:
When described comparative result is the authentication result of untrusted, it is judged that the operation for electronic equipment please
Asking is not to be initiated by user trusty, and refusal responds described operation requests, and refusal is opened and user
The authority process that my identity is relevant.
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment
Checking, described electronic equipment includes:
Acquiring unit, is used for obtaining initial identity information;
First control unit, for identity information initial described in pretreatment to produce identity data to be confirmed;
Secure processing units, for relatively described identity data to be confirmed and described preset data template, generates
Comparative result;
Second control unit, is used for receiving described comparative result, and judges whether that responding described operation asks according to this
Ask.
In such scheme, described first control unit, it is further used for institute by safe encryption hardware interface
State identity data to be confirmed and be transferred to described secure processing units.
In such scheme, described secure processing units, be further used for identity data to be confirmed described in comparison with
Described preset data template, generates whether described identity data to be confirmed is believable authentication result.
In such scheme, described second control unit, it is described believable for being further used for described comparative result
During authentication result, it is judged that the operation requests for electronic equipment is initiated by user trusty,
Respond described operation requests, open the authority relevant with user's identity and process.
In such scheme, described second control unit, it is further used for the body that described comparative result is untrusted
During part the result, it is judged that the operation requests for electronic equipment is not to be sent out by user trusty
Rising, refusal responds described operation requests, and refusal is opened the authority relevant with user's identity and processed.
The described information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment
Authentication, described method includes: obtain initial identity information;Described in the first control unit pretreatment
Initial identity information is to produce identity data to be confirmed;Via the more described identity to be confirmed of secure processing units
Data and described preset data template, generate comparative result;Knot is compared via the second control unit reception is described
Really, and judge whether according to this to respond described operation requests.
Use the embodiment of the present invention, be by the first control unit, the pretreatment of initial identity information to be treated
Confirm identity data, then via the more described identity data to be confirmed of secure processing units and described preset data
Template, generates comparative result, is finally judged whether that response is for electricity according to comparative result by the second control unit
The operation requests of subset, thus complete the authentication to operation requests promoter.The employing present invention implements
Example, on the one hand: safe class is high, it is not easy to cracked by camouflage user's malice, such that it is able to protection user
Privacy and safety;On the other hand, it is not necessary to introduce extra separate hardware and realize, thus reduce cost.
Accompanying drawing explanation
Fig. 1 is one of the inventive method embodiment one and realizes schematic flow sheet;
Fig. 2 is one of the inventive method embodiment and realizes schematic flow sheet;
Fig. 3 is a composition structural representation of electronic equipment embodiment of the present invention;
Fig. 4 is a composition structural representation of electronic equipment embodiment of the present invention;
Fig. 5 is the schematic diagram of an application scenarios of the application embodiment of the present invention;
Fig. 6 is authentication schematic flow sheet based on system shown in Figure 5 hardware structure.
Detailed description of the invention
Enforcement to technical scheme is described in further detail below in conjunction with the accompanying drawings.
Embodiment of the method one:
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment
Authentication, as it is shown in figure 1, described method includes:
Step 101, obtain initial identity information.
Step 102, via identity information initial described in the first control unit pretreatment to produce identity to be confirmed
Data.
Step 103, via the more described identity data to be confirmed of secure processing units and described preset data mould
Plate, generates comparative result.
Step 104, via second control unit receive described comparative result, and according to this judge whether respond institute
State operation requests.
Use the embodiment of the present invention, be by the first control unit, the pretreatment of initial identity information to be treated
Confirm identity data, then via the more described identity data to be confirmed of secure processing units and described preset data
Template, generates comparative result, is finally judged whether that response is for electricity according to comparative result by the second control unit
The operation requests of subset, thus complete the authentication to operation requests promoter.The employing present invention implements
Example, on the one hand: safe class is high, it is not easy to cracked by camouflage user's malice, such that it is able to protection user
Privacy and safety;On the other hand, it is not necessary to introduce extra separate hardware and realize, thus reduce cost.
Here, step 101 is performed by fingerprint Identification sensor (Fingerprint sensor), and first controls list
Unit is EC, and secure processing units is Secure element, and when the second control unit is CPU, one concrete
Example is: Fingerprint sensor obtains finger print information, via EC, finger print information is carried out pretreatment,
To identity data to be confirmed;Pre-with described via the more described identity data to be confirmed of Secure element
If data template, generate comparative result;Receive described comparative result via CPU, and judge whether according to this to ring
Should described operation requests.
Embodiment of the method two:
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment
Authentication, as in figure 2 it is shown, described method includes:
Step 201, obtain initial identity information.
Step 202, via identity information initial described in the first control unit pretreatment to produce identity to be confirmed
Data.
Described identity data to be confirmed is passed by step 203, the first control unit by safe encryption hardware interface
It is defeated by described secure processing units.
Step 204, via the more described identity data to be confirmed of secure processing units and described preset data mould
Plate, generates comparative result.
Step 205, via second control unit receive described comparative result, and according to this judge whether respond institute
State operation requests.
Embodiment of the method three:
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment
Authentication, as it is shown on figure 3, described method includes:
Step 301, obtain initial identity information.
Step 302, via identity information initial described in the first control unit pretreatment to produce identity to be confirmed
Data.
Described identity data to be confirmed is passed by step 303, the first control unit by safe encryption hardware interface
It is defeated by described secure processing units.
Step 304, the first more described identity data to be confirmed of control unit and described preset data template,
Generate whether described identity data to be confirmed is believable authentication result, if it is, perform step
305, otherwise, perform step 306.
When step 305, described comparative result are described believable authentication result, it is judged that for electronics
The operation requests of equipment is initiated by user trusty, responds described operation requests, opens and user
The authority process that my identity is relevant.
When step 306, described comparative result are the authentication result of untrusted, it is judged that set for electronics
Standby operation requests is not to be initiated by user trusty, and refusal responds described operation requests, refusal
Open the authority relevant with user's identity to process.
It need to be noted that: the description of following electronic equipment item, it is similar for describing with said method,
Describe with the beneficial effect of method, do not repeat.For the skill not disclosed in electronic equipment embodiment of the present invention
Art details, refer to the description of the inventive method embodiment.
Electronic equipment embodiment one:
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment
Checking, as shown in Figure 4, described electronic equipment includes:
Acquiring unit 11, is used for obtaining initial identity information;First control unit 12, for described in pretreatment
Initial identity information is to produce identity data to be confirmed;Secure processing units 13, for described the most to be confirmed
Identity data and described preset data template, generate comparative result;Second control unit 14, is used for receiving institute
State comparative result, and judge whether according to this to respond described operation requests.
Electronic equipment embodiment two:
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment
Checking, as shown in Figure 4, described electronic equipment includes:
Acquiring unit 11, is used for obtaining initial identity information;First control unit 12, for described in pretreatment
Initial identity information is to produce identity data to be confirmed, by safe encryption hardware interface by described body to be confirmed
Number is according to being transferred to described secure processing units 13;Secure processing units 13, for relatively described body to be confirmed
Number evidence and described preset data template, generate comparative result;Second control unit 14, is used for receiving described
Comparative result, and judge whether according to this to respond described operation requests.
Electronic equipment embodiment three:
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment
Checking, as shown in Figure 4, described electronic equipment includes:
Acquiring unit 11, is used for obtaining initial identity information;First control unit 12, for described in pretreatment
Initial identity information is to produce identity data to be confirmed, by safe encryption hardware interface by described body to be confirmed
Number is according to being transferred to described secure processing units 13;Secure processing units 13, for relatively described body to be confirmed
Number evidence and described preset data template, generate whether described identity data to be confirmed is believable authentication
Result;Second control unit 14, for comparative result be described believable authentication result time, it is judged that
Operation requests for electronic equipment is initiated by user trusty, responds described operation requests, opens
Open the authority relevant with user's identity to process;Or, described comparative result is the authentication of untrusted
During result, it is judged that the operation requests for electronic equipment is not to be initiated by user trusty, refuses
Lost art answers described operation requests, refusal to open the authority relevant with user's identity and process.
As a example by a real world applications scene, the embodiment of the present invention is described below:
Application scenarios is fingerprint technology, is based on the stricture of vagina using the texture of finger and thumb front end to press
Print identifies identity.Fingerprint is a kind of method reliably discriminated one's identification, because on everyone each finger
Texture arrangement different and also not because of grow or the age and change.Fingerprint is for disclosing the true of a people
Identity, although denying in person, pseudonymity, or occur because of age disease, plastic surgery operations or accident
Change in appearance.Utilize fingerprint to be referred to as dactyloscopy as a kind of practice discriminated one's identification, be modern
An indispensable supplementary means in law enforcement.
Along with intelligent terminal, such as popularizing of smart mobile phone, this fingerprint technology above-mentioned is known as biology
The most integrated, enjoy liking of user.But the safety problem of fingerprint technology is also
Become the problem presently the most paid close attention to.Such as, a kind of existing solution is: fingerprint is directly connected to
CPU, the shortcoming of the program is: software solution, can be stolen user profile by Malware;Another
Planting existing solution is: fingerprint is directly connected to safety governor, and the shortcoming of the program is: hardware
Solution, safety governor needs certain process operational capability, and price comparison is expensive, cost up~1 $,
The way of this extra increase hardware, can increase manufacturing cost.
This application scene uses the embodiment of the present invention, for one reliable fingerprint identification (fingerprint) safety
System design scheme, is the Safe Design Scheme of integrated fingerprint on notebook, it is of course also possible to
Other intelligent terminal, as used the embodiment of the present invention on smart mobile phone, the program can provide the user can
The security system design leaned on, it is ensured that user does not haves potential safety hazard during using fingerprint.
As a example by the Safe Design Scheme of fingerprint integrated on notebook, it is only necessary to utilize notebook existing
There is controller, and without adding hardware resource especially, extra manufacturing cost will not be increased, equally
Provide the user reliable security system, improve product competitiveness.
The system hardware framework that this programme uses is as it is shown in figure 5, include: Fingerprint Sensor21, is used for
Obtain user's initial fingerprint information, such as image information;EC22, is used for obtaining CPU control command, reads
Take the image information of Fingerprint Sensor, carry out pretreatment based on image information and obtain image data,
Image data is to SE in transmission, exports to CPU after obtaining SE result;SE23, has the peace of hardware encryption
Full processing module, is used for storing user fingerprints template, and the image data receiving EC transmission compares
Right, reliable result is exported to EC, exported to CPU by by reliable result afterwards;CPU24, as pen
Note present processor, is used for processing application program, and it is corresponding that the reliable result for obtaining from EC carries out fingerprint
The authentication of user, to decide whether user is responded for the operation requests of electronic equipment, such as,
Operation requests is user's power on request, then according to reliable result judge the operation requests for electronic equipment by
User trusty is initiated, and responds described operation requests, opens the power relevant with user's identity
Limit processes, and specially opens notebook, otherwise, during for the authentication result of untrusted, it is judged that for
The operation requests of electronic equipment is not to be initiated by user trusty, and refusal responds described operation requests,
Refusal is opened the authority relevant with user's identity and is processed.
From fig. 5, it can be seen that key point is: utilize the system controller EC increased as Fingerprint
Communication bridge, devise the communication link between CPU-EC-SE-Fingerprint Sensor, with ensure
The safety information of user will not become Malware and steal, it is provided that security system reliably, without hardware cost, it may be assumed that
By Fingerprint Sensor and there is the safety governor (SE, Secure Element) of ciphering unit all
It is not direct-connected for being connected to EC, CPU and Fingerprint Sensor, CPU with SE is not direct-connected, all
Need via EC transfer and process.Visible: the monitoring system of this programme is realized by software and hardware, utilizes system
EC controller, after EC receives CPU control command, reads the image information of Fingerprint Sensor,
EC processes image information and generates image data, and image data passes to SE module, SE module
Determine whether credible image by comparison template, and pass the result to EC, EC receive after output to
CPU, completes user's identification.Whole identification process, CPU cannot directly from Fingerprint Sensor and
SE module obtains image information and comparison template.
Based on the system hardware framework shown in Fig. 5, the authentication flow process of execution as shown in Figure 6, including:
Step 501, when user by software transfer fingerprint function time, by Fingerprint Sensor
Scanning obtains image information.
Step 502, CPU notice EC opens fingerprint function, reads fingerprint's by EC
Image information.
The image information read is processed by step 503, EC, generates image data.
Step 504, EC pass through safe encryption hardware interface, and the image data after processing passes to SE,
SE accepts the image data of EC transmission, by being carried out with the image template stored by image data
Coupling, to be confirmed whether as credible image, obtains reliable result.
Reliable result is fed back to EC by step 505, SE, then is passed to CPU by EC and carry out final sentencing
Disconnected, to decide whether to respond for this operation requests, finally response results is returned to the User of user
APP。
This application scene uses the embodiment of the present invention, uses and has the beneficial effect that 1 after this programme) this programme
The image information that fingerprint obtains is not returned and is directly obtained by CPU, it is ensured that other Malwares are stolen
User profile, it is provided that security system reliably;2) this programme is hardware encipherment scheme, improves safe system
Number;3) this programme utilizes existing EC resource as communications conduit, it is not necessary to add additional hardware resources, nothing
cost up;4) this programme is completed by bottom controller, is not take up cpu resource, will not increase system power dissipation;
5) Intelligent Recognition user's request, improves Consumer's Experience.
In several embodiments provided herein, it should be understood that disclosed equipment and method,
Can realize by another way.Apparatus embodiments described above is only schematically, such as,
The division of described unit, is only a kind of logic function and divides, and actual can have other division side when realizing
Formula, such as: multiple unit or assembly can be in conjunction with, or are desirably integrated into another system, or some features can
To ignore, or do not perform.It addition, the coupling or straight that shown or discussed each ingredient is each other
Connect coupling or communication connection can be the INDIRECT COUPLING by some interfaces, equipment or unit or communication connection,
Can be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, as
The parts that unit shows can be or may not be physical location, i.e. may be located at a place, it is possible to
To be distributed on multiple NE;Part or all of unit therein can be selected according to the actual needs
Realize the purpose of the present embodiment scheme.
It addition, each functional unit in various embodiments of the present invention can be fully integrated in a processing unit,
Can also be that each unit is individually as a unit, it is also possible to two or more unit are integrated in one
In individual unit;Above-mentioned integrated unit both can realize to use the form of hardware, it would however also be possible to employ hardware adds soft
The form of part functional unit realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can
Completing with the hardware relevant by programmed instruction, aforesaid program can be stored in an embodied on computer readable and deposit
In storage media, this program upon execution, performs to include the step of said method embodiment;And aforesaid storage
Medium includes: movable storage device, read only memory (ROM, Read-Only Memory), deposit at random
Access to memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
Or, if the above-mentioned integrated unit of the present invention is using the form realization of software function module and as independent
Production marketing or use time, it is also possible to be stored in a computer read/write memory medium.Based on so
Understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words can
Embodying with the form with software product, this computer software product is stored in a storage medium, bag
Include some instructions with so that a computer equipment (can be personal computer, server or network
Equipment etc.) perform all or part of of method described in each embodiment of the present invention.And aforesaid storage medium bag
Include: various Jie that can store program code such as movable storage device, ROM, RAM, magnetic disc or CD
Matter.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited to
This, any those familiar with the art, in the technical scope that the invention discloses, can readily occur in
Change or replacement, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should
It is as the criterion with described scope of the claims.
Claims (10)
1. an information processing method, for processing the authentication of the operation requests for electronic equipment, institute
The method of stating includes:
Obtain initial identity information;
Via identity information initial described in the first control unit pretreatment to produce identity data to be confirmed;
Via the more described identity data to be confirmed of secure processing units and described preset data template, generate ratio
Relatively result;
Receive described comparative result via the second control unit, and judge whether according to this to respond described operation requests.
Method the most according to claim 1, described method also includes:
Described identity data to be confirmed is transferred to institute by safe encryption hardware interface by described first control unit
State secure processing units.
Method the most according to claim 1, described via the more described body to be confirmed of secure processing units
Number evidence and described preset data template, generate comparative result, including:
Relatively described identity data to be confirmed and described preset data template, generate described identity data to be confirmed
Whether it is believable authentication result.
Method the most according to claim 3, described via the second control unit described comparative result of reception,
And judge whether according to this to respond described operation requests, including:
When described comparative result is described believable authentication result, it is judged that for the operation of electronic equipment
Request is initiated by user trusty, responds described operation requests, opens and has with user's identity
The authority closed processes.
Method the most according to claim 3, described via the second control unit described comparative result of reception,
And judge whether according to this to respond described operation requests, including:
When described comparative result is the authentication result of untrusted, it is judged that the operation for electronic equipment please
Asking is not to be initiated by user trusty, and refusal responds described operation requests, and refusal is opened and user
The authority process that my identity is relevant.
6. an electronic equipment, for processing the authentication of the operation requests for electronic equipment, described electricity
Subset includes:
Acquiring unit, is used for obtaining initial identity information;
First control unit, for identity information initial described in pretreatment to produce identity data to be confirmed;
Secure processing units, for relatively described identity data to be confirmed and described preset data template, generates
Comparative result;
Second control unit, is used for receiving described comparative result, and judges whether that responding described operation asks according to this
Ask.
Electronic equipment the most according to claim 6, described first control unit, it is further used for passing through
Described identity data to be confirmed is transferred to described secure processing units by safe encryption hardware interface.
Electronic equipment the most according to claim 6, described secure processing units, it is further used for comparing
Described identity data to be confirmed and described preset data template, generate whether described identity data to be confirmed is can
The authentication result of letter.
Electronic equipment the most according to claim 8, described second control unit, it is further used for described
When comparative result is described believable authentication result, it is judged that for the operation requests of electronic equipment by can
The user trusted is initiated, and responds described operation requests, opens the authority relevant with user's identity
Process.
Electronic equipment the most according to claim 8, described second control unit, it is further used for institute
When stating the authentication result that comparative result is untrusted, it is judged that the operation requests for electronic equipment is not
Being initiated by user trusty, refusal responds described operation requests, and refusal is opened and this person of user
The authority that part is relevant processes.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510284827.4A CN106295285B (en) | 2015-05-28 | 2015-05-28 | Information processing method and electronic equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510284827.4A CN106295285B (en) | 2015-05-28 | 2015-05-28 | Information processing method and electronic equipment |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106295285A true CN106295285A (en) | 2017-01-04 |
| CN106295285B CN106295285B (en) | 2020-02-21 |
Family
ID=57635695
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510284827.4A Active CN106295285B (en) | 2015-05-28 | 2015-05-28 | Information processing method and electronic equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106295285B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110651268A (en) * | 2017-05-23 | 2020-01-03 | 指纹卡有限公司 | Method and electronic device for authenticating user |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1713101A (en) * | 2005-07-12 | 2005-12-28 | 中国长城计算机深圳股份有限公司 | Computer power-on identity authentication system and authentication method |
| CN1822013A (en) * | 2006-03-14 | 2006-08-23 | 上海一维科技有限公司 | Fingerprint biometric identification engine system and identification method based on trusted platform module |
| CN103617384A (en) * | 2013-11-27 | 2014-03-05 | 广州御银科技股份有限公司 | Method and system for verifying starting permissions of bill sorting machine |
-
2015
- 2015-05-28 CN CN201510284827.4A patent/CN106295285B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1713101A (en) * | 2005-07-12 | 2005-12-28 | 中国长城计算机深圳股份有限公司 | Computer power-on identity authentication system and authentication method |
| CN1822013A (en) * | 2006-03-14 | 2006-08-23 | 上海一维科技有限公司 | Fingerprint biometric identification engine system and identification method based on trusted platform module |
| CN103617384A (en) * | 2013-11-27 | 2014-03-05 | 广州御银科技股份有限公司 | Method and system for verifying starting permissions of bill sorting machine |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110651268A (en) * | 2017-05-23 | 2020-01-03 | 指纹卡有限公司 | Method and electronic device for authenticating user |
| CN110651268B (en) * | 2017-05-23 | 2023-10-17 | 指纹卡安娜卡敦知识产权有限公司 | Method for authenticating user and electronic equipment |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106295285B (en) | 2020-02-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN105429761B (en) | A kind of key generation method and device | |
| CN107332659B (en) | Identity authentication method, storage medium and system based on biological characteristics | |
| EP4022472B1 (en) | User authentication framework | |
| EP3966736B1 (en) | Method and system to prevent identity theft for fingerprint recognition enabled touch screen devices | |
| Yusop et al. | Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity | |
| Lovisotto et al. | Mobile biometrics in financial services: A five factor framework | |
| KR101977897B1 (en) | User Authentication System Using Mixed Reality, Virtual Reality, Augmented Reality | |
| CN104346550B (en) | A kind of information processing method and a kind of electronic equipment | |
| CN104820814A (en) | Second-generation ID card anti-counterfeiting verification system | |
| CN105868610A (en) | Method and system for realizing user authentication through biological characteristic information | |
| CN107517217A (en) | A kind of multiple-factor wireless key fill system based on fingerprint recognition | |
| CN107395369A (en) | Towards mobile Internet from the authentication method of carrying device, access method and system | |
| Aramide | AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics | |
| Kwon et al. | CCTV-based multi-factor authentication system. | |
| Ju et al. | A study on user authentication methodology using numeric password and fingerprint biometric information | |
| CN105208045B (en) | A kind of auth method, equipment and system | |
| Malik | Biometric Authentication-Risks and advancements in biometric security systems | |
| CN110826038B (en) | Data encryption and decryption method and device | |
| CN105516182B (en) | A kind of mutual authentication method and its system between smart card and reader | |
| CN104462926A (en) | Intelligent card identity recognition method and system | |
| CN106295285A (en) | A kind of information processing method and electronic equipment | |
| Kannavara et al. | Topics in biometric human-machine interaction security | |
| Conti et al. | An embedded biometric sensor for ubiquitous authentication | |
| CN109450878A (en) | Biological feather recognition method, device and system | |
| Moepi et al. | Implementation of an enhanced multi-factor authentication scheme with a track and trace capability for online banking platforms |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |