CN106295285A - A kind of information processing method and electronic equipment - Google Patents

A kind of information processing method and electronic equipment Download PDF

Info

Publication number
CN106295285A
CN106295285A CN201510284827.4A CN201510284827A CN106295285A CN 106295285 A CN106295285 A CN 106295285A CN 201510284827 A CN201510284827 A CN 201510284827A CN 106295285 A CN106295285 A CN 106295285A
Authority
CN
China
Prior art keywords
electronic equipment
confirmed
identity
operation requests
control unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510284827.4A
Other languages
Chinese (zh)
Other versions
CN106295285B (en
Inventor
高营
程孝仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510284827.4A priority Critical patent/CN106295285B/en
Publication of CN106295285A publication Critical patent/CN106295285A/en
Application granted granted Critical
Publication of CN106295285B publication Critical patent/CN106295285B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of information processing method and electronic equipment, wherein, described information processing method, for processing the authentication of the operation requests for electronic equipment, described method includes: obtain initial identity information;Via identity information initial described in the first control unit pretreatment to produce identity data to be confirmed;Via the more described identity data to be confirmed of secure processing units and described preset data template, generate comparative result;Receive described comparative result via the second control unit, and judge whether according to this to respond described operation requests.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to mechanics of communication, particularly relate to a kind of information processing method and electronic equipment.
Background technology
Present inventor, during realizing the embodiment of the present application technical scheme, at least finds correlation technique The following technical problem of middle existence:
Biological identification technology by the most integrated, is liked by user on the mobile apparatus deeply.Biological identification technology May be used for intelligent unlocking, intelligence start etc. relates to privacy of user and the checking of safety.A kind of bio-identification Technology is fingerprint qualification program (fingerprint), existing fingerprint, and it realizes the problem that technology exists It is: 1) use the very easy user's malice of being pretended of fingerprint of software engineering realization to crack, thus nothing The privacy of method protection user and safety;2) fingerprint using software engineering to realize needs to introduce extra Separate hardware realizes, and increases cost.
But, in correlation technique, for this problem, there is no effective solution.
Summary of the invention
In view of this, the embodiment of the present invention, desirable to provide a kind of information processing method and electronic equipment, at least solves The problem that prior art of having determined exists.
The technical scheme of the embodiment of the present invention is achieved in that
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment Authentication, described method includes:
Obtain initial identity information;
Via identity information initial described in the first control unit pretreatment to produce identity data to be confirmed;
Via the more described identity data to be confirmed of secure processing units and described preset data template, generate ratio Relatively result;
Receive described comparative result via the second control unit, and judge whether according to this to respond described operation requests.
In such scheme, described method also includes:
Described identity data to be confirmed is transferred to institute by safe encryption hardware interface by described first control unit State secure processing units.
In such scheme, described default with described via the more described identity data to be confirmed of secure processing units Data template, generates comparative result, including:
Relatively described identity data to be confirmed and described preset data template, generate described identity data to be confirmed Whether it is believable authentication result.
In such scheme, described via the second control unit described comparative result of reception, and judge whether according to this Respond described operation requests, including:
When described comparative result is described believable authentication result, it is judged that for the operation of electronic equipment Request is initiated by user trusty, responds described operation requests, opens and has with user's identity The authority closed processes.
In such scheme, described via the second control unit described comparative result of reception, and judge whether according to this Respond described operation requests, including:
When described comparative result is the authentication result of untrusted, it is judged that the operation for electronic equipment please Asking is not to be initiated by user trusty, and refusal responds described operation requests, and refusal is opened and user The authority process that my identity is relevant.
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment Checking, described electronic equipment includes:
Acquiring unit, is used for obtaining initial identity information;
First control unit, for identity information initial described in pretreatment to produce identity data to be confirmed;
Secure processing units, for relatively described identity data to be confirmed and described preset data template, generates Comparative result;
Second control unit, is used for receiving described comparative result, and judges whether that responding described operation asks according to this Ask.
In such scheme, described first control unit, it is further used for institute by safe encryption hardware interface State identity data to be confirmed and be transferred to described secure processing units.
In such scheme, described secure processing units, be further used for identity data to be confirmed described in comparison with Described preset data template, generates whether described identity data to be confirmed is believable authentication result.
In such scheme, described second control unit, it is described believable for being further used for described comparative result During authentication result, it is judged that the operation requests for electronic equipment is initiated by user trusty, Respond described operation requests, open the authority relevant with user's identity and process.
In such scheme, described second control unit, it is further used for the body that described comparative result is untrusted During part the result, it is judged that the operation requests for electronic equipment is not to be sent out by user trusty Rising, refusal responds described operation requests, and refusal is opened the authority relevant with user's identity and processed.
The described information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment Authentication, described method includes: obtain initial identity information;Described in the first control unit pretreatment Initial identity information is to produce identity data to be confirmed;Via the more described identity to be confirmed of secure processing units Data and described preset data template, generate comparative result;Knot is compared via the second control unit reception is described Really, and judge whether according to this to respond described operation requests.
Use the embodiment of the present invention, be by the first control unit, the pretreatment of initial identity information to be treated Confirm identity data, then via the more described identity data to be confirmed of secure processing units and described preset data Template, generates comparative result, is finally judged whether that response is for electricity according to comparative result by the second control unit The operation requests of subset, thus complete the authentication to operation requests promoter.The employing present invention implements Example, on the one hand: safe class is high, it is not easy to cracked by camouflage user's malice, such that it is able to protection user Privacy and safety;On the other hand, it is not necessary to introduce extra separate hardware and realize, thus reduce cost.
Accompanying drawing explanation
Fig. 1 is one of the inventive method embodiment one and realizes schematic flow sheet;
Fig. 2 is one of the inventive method embodiment and realizes schematic flow sheet;
Fig. 3 is a composition structural representation of electronic equipment embodiment of the present invention;
Fig. 4 is a composition structural representation of electronic equipment embodiment of the present invention;
Fig. 5 is the schematic diagram of an application scenarios of the application embodiment of the present invention;
Fig. 6 is authentication schematic flow sheet based on system shown in Figure 5 hardware structure.
Detailed description of the invention
Enforcement to technical scheme is described in further detail below in conjunction with the accompanying drawings.
Embodiment of the method one:
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment Authentication, as it is shown in figure 1, described method includes:
Step 101, obtain initial identity information.
Step 102, via identity information initial described in the first control unit pretreatment to produce identity to be confirmed Data.
Step 103, via the more described identity data to be confirmed of secure processing units and described preset data mould Plate, generates comparative result.
Step 104, via second control unit receive described comparative result, and according to this judge whether respond institute State operation requests.
Use the embodiment of the present invention, be by the first control unit, the pretreatment of initial identity information to be treated Confirm identity data, then via the more described identity data to be confirmed of secure processing units and described preset data Template, generates comparative result, is finally judged whether that response is for electricity according to comparative result by the second control unit The operation requests of subset, thus complete the authentication to operation requests promoter.The employing present invention implements Example, on the one hand: safe class is high, it is not easy to cracked by camouflage user's malice, such that it is able to protection user Privacy and safety;On the other hand, it is not necessary to introduce extra separate hardware and realize, thus reduce cost.
Here, step 101 is performed by fingerprint Identification sensor (Fingerprint sensor), and first controls list Unit is EC, and secure processing units is Secure element, and when the second control unit is CPU, one concrete Example is: Fingerprint sensor obtains finger print information, via EC, finger print information is carried out pretreatment, To identity data to be confirmed;Pre-with described via the more described identity data to be confirmed of Secure element If data template, generate comparative result;Receive described comparative result via CPU, and judge whether according to this to ring Should described operation requests.
Embodiment of the method two:
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment Authentication, as in figure 2 it is shown, described method includes:
Step 201, obtain initial identity information.
Step 202, via identity information initial described in the first control unit pretreatment to produce identity to be confirmed Data.
Described identity data to be confirmed is passed by step 203, the first control unit by safe encryption hardware interface It is defeated by described secure processing units.
Step 204, via the more described identity data to be confirmed of secure processing units and described preset data mould Plate, generates comparative result.
Step 205, via second control unit receive described comparative result, and according to this judge whether respond institute State operation requests.
Embodiment of the method three:
A kind of information processing method of the embodiment of the present invention, for processing the operation requests for electronic equipment Authentication, as it is shown on figure 3, described method includes:
Step 301, obtain initial identity information.
Step 302, via identity information initial described in the first control unit pretreatment to produce identity to be confirmed Data.
Described identity data to be confirmed is passed by step 303, the first control unit by safe encryption hardware interface It is defeated by described secure processing units.
Step 304, the first more described identity data to be confirmed of control unit and described preset data template, Generate whether described identity data to be confirmed is believable authentication result, if it is, perform step 305, otherwise, perform step 306.
When step 305, described comparative result are described believable authentication result, it is judged that for electronics The operation requests of equipment is initiated by user trusty, responds described operation requests, opens and user The authority process that my identity is relevant.
When step 306, described comparative result are the authentication result of untrusted, it is judged that set for electronics Standby operation requests is not to be initiated by user trusty, and refusal responds described operation requests, refusal Open the authority relevant with user's identity to process.
It need to be noted that: the description of following electronic equipment item, it is similar for describing with said method, Describe with the beneficial effect of method, do not repeat.For the skill not disclosed in electronic equipment embodiment of the present invention Art details, refer to the description of the inventive method embodiment.
Electronic equipment embodiment one:
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment Checking, as shown in Figure 4, described electronic equipment includes:
Acquiring unit 11, is used for obtaining initial identity information;First control unit 12, for described in pretreatment Initial identity information is to produce identity data to be confirmed;Secure processing units 13, for described the most to be confirmed Identity data and described preset data template, generate comparative result;Second control unit 14, is used for receiving institute State comparative result, and judge whether according to this to respond described operation requests.
Electronic equipment embodiment two:
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment Checking, as shown in Figure 4, described electronic equipment includes:
Acquiring unit 11, is used for obtaining initial identity information;First control unit 12, for described in pretreatment Initial identity information is to produce identity data to be confirmed, by safe encryption hardware interface by described body to be confirmed Number is according to being transferred to described secure processing units 13;Secure processing units 13, for relatively described body to be confirmed Number evidence and described preset data template, generate comparative result;Second control unit 14, is used for receiving described Comparative result, and judge whether according to this to respond described operation requests.
Electronic equipment embodiment three:
A kind of electronic equipment of the embodiment of the present invention, for processing the identity of the operation requests for electronic equipment Checking, as shown in Figure 4, described electronic equipment includes:
Acquiring unit 11, is used for obtaining initial identity information;First control unit 12, for described in pretreatment Initial identity information is to produce identity data to be confirmed, by safe encryption hardware interface by described body to be confirmed Number is according to being transferred to described secure processing units 13;Secure processing units 13, for relatively described body to be confirmed Number evidence and described preset data template, generate whether described identity data to be confirmed is believable authentication Result;Second control unit 14, for comparative result be described believable authentication result time, it is judged that Operation requests for electronic equipment is initiated by user trusty, responds described operation requests, opens Open the authority relevant with user's identity to process;Or, described comparative result is the authentication of untrusted During result, it is judged that the operation requests for electronic equipment is not to be initiated by user trusty, refuses Lost art answers described operation requests, refusal to open the authority relevant with user's identity and process.
As a example by a real world applications scene, the embodiment of the present invention is described below:
Application scenarios is fingerprint technology, is based on the stricture of vagina using the texture of finger and thumb front end to press Print identifies identity.Fingerprint is a kind of method reliably discriminated one's identification, because on everyone each finger Texture arrangement different and also not because of grow or the age and change.Fingerprint is for disclosing the true of a people Identity, although denying in person, pseudonymity, or occur because of age disease, plastic surgery operations or accident Change in appearance.Utilize fingerprint to be referred to as dactyloscopy as a kind of practice discriminated one's identification, be modern An indispensable supplementary means in law enforcement.
Along with intelligent terminal, such as popularizing of smart mobile phone, this fingerprint technology above-mentioned is known as biology The most integrated, enjoy liking of user.But the safety problem of fingerprint technology is also Become the problem presently the most paid close attention to.Such as, a kind of existing solution is: fingerprint is directly connected to CPU, the shortcoming of the program is: software solution, can be stolen user profile by Malware;Another Planting existing solution is: fingerprint is directly connected to safety governor, and the shortcoming of the program is: hardware Solution, safety governor needs certain process operational capability, and price comparison is expensive, cost up~1 $, The way of this extra increase hardware, can increase manufacturing cost.
This application scene uses the embodiment of the present invention, for one reliable fingerprint identification (fingerprint) safety System design scheme, is the Safe Design Scheme of integrated fingerprint on notebook, it is of course also possible to Other intelligent terminal, as used the embodiment of the present invention on smart mobile phone, the program can provide the user can The security system design leaned on, it is ensured that user does not haves potential safety hazard during using fingerprint.
As a example by the Safe Design Scheme of fingerprint integrated on notebook, it is only necessary to utilize notebook existing There is controller, and without adding hardware resource especially, extra manufacturing cost will not be increased, equally Provide the user reliable security system, improve product competitiveness.
The system hardware framework that this programme uses is as it is shown in figure 5, include: Fingerprint Sensor21, is used for Obtain user's initial fingerprint information, such as image information;EC22, is used for obtaining CPU control command, reads Take the image information of Fingerprint Sensor, carry out pretreatment based on image information and obtain image data, Image data is to SE in transmission, exports to CPU after obtaining SE result;SE23, has the peace of hardware encryption Full processing module, is used for storing user fingerprints template, and the image data receiving EC transmission compares Right, reliable result is exported to EC, exported to CPU by by reliable result afterwards;CPU24, as pen Note present processor, is used for processing application program, and it is corresponding that the reliable result for obtaining from EC carries out fingerprint The authentication of user, to decide whether user is responded for the operation requests of electronic equipment, such as, Operation requests is user's power on request, then according to reliable result judge the operation requests for electronic equipment by User trusty is initiated, and responds described operation requests, opens the power relevant with user's identity Limit processes, and specially opens notebook, otherwise, during for the authentication result of untrusted, it is judged that for The operation requests of electronic equipment is not to be initiated by user trusty, and refusal responds described operation requests, Refusal is opened the authority relevant with user's identity and is processed.
From fig. 5, it can be seen that key point is: utilize the system controller EC increased as Fingerprint Communication bridge, devise the communication link between CPU-EC-SE-Fingerprint Sensor, with ensure The safety information of user will not become Malware and steal, it is provided that security system reliably, without hardware cost, it may be assumed that By Fingerprint Sensor and there is the safety governor (SE, Secure Element) of ciphering unit all It is not direct-connected for being connected to EC, CPU and Fingerprint Sensor, CPU with SE is not direct-connected, all Need via EC transfer and process.Visible: the monitoring system of this programme is realized by software and hardware, utilizes system EC controller, after EC receives CPU control command, reads the image information of Fingerprint Sensor, EC processes image information and generates image data, and image data passes to SE module, SE module Determine whether credible image by comparison template, and pass the result to EC, EC receive after output to CPU, completes user's identification.Whole identification process, CPU cannot directly from Fingerprint Sensor and SE module obtains image information and comparison template.
Based on the system hardware framework shown in Fig. 5, the authentication flow process of execution as shown in Figure 6, including:
Step 501, when user by software transfer fingerprint function time, by Fingerprint Sensor Scanning obtains image information.
Step 502, CPU notice EC opens fingerprint function, reads fingerprint's by EC Image information.
The image information read is processed by step 503, EC, generates image data.
Step 504, EC pass through safe encryption hardware interface, and the image data after processing passes to SE, SE accepts the image data of EC transmission, by being carried out with the image template stored by image data Coupling, to be confirmed whether as credible image, obtains reliable result.
Reliable result is fed back to EC by step 505, SE, then is passed to CPU by EC and carry out final sentencing Disconnected, to decide whether to respond for this operation requests, finally response results is returned to the User of user APP。
This application scene uses the embodiment of the present invention, uses and has the beneficial effect that 1 after this programme) this programme The image information that fingerprint obtains is not returned and is directly obtained by CPU, it is ensured that other Malwares are stolen User profile, it is provided that security system reliably;2) this programme is hardware encipherment scheme, improves safe system Number;3) this programme utilizes existing EC resource as communications conduit, it is not necessary to add additional hardware resources, nothing cost up;4) this programme is completed by bottom controller, is not take up cpu resource, will not increase system power dissipation; 5) Intelligent Recognition user's request, improves Consumer's Experience.
In several embodiments provided herein, it should be understood that disclosed equipment and method, Can realize by another way.Apparatus embodiments described above is only schematically, such as, The division of described unit, is only a kind of logic function and divides, and actual can have other division side when realizing Formula, such as: multiple unit or assembly can be in conjunction with, or are desirably integrated into another system, or some features can To ignore, or do not perform.It addition, the coupling or straight that shown or discussed each ingredient is each other Connect coupling or communication connection can be the INDIRECT COUPLING by some interfaces, equipment or unit or communication connection, Can be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, as The parts that unit shows can be or may not be physical location, i.e. may be located at a place, it is possible to To be distributed on multiple NE;Part or all of unit therein can be selected according to the actual needs Realize the purpose of the present embodiment scheme.
It addition, each functional unit in various embodiments of the present invention can be fully integrated in a processing unit, Can also be that each unit is individually as a unit, it is also possible to two or more unit are integrated in one In individual unit;Above-mentioned integrated unit both can realize to use the form of hardware, it would however also be possible to employ hardware adds soft The form of part functional unit realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can Completing with the hardware relevant by programmed instruction, aforesaid program can be stored in an embodied on computer readable and deposit In storage media, this program upon execution, performs to include the step of said method embodiment;And aforesaid storage Medium includes: movable storage device, read only memory (ROM, Read-Only Memory), deposit at random Access to memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
Or, if the above-mentioned integrated unit of the present invention is using the form realization of software function module and as independent Production marketing or use time, it is also possible to be stored in a computer read/write memory medium.Based on so Understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words can Embodying with the form with software product, this computer software product is stored in a storage medium, bag Include some instructions with so that a computer equipment (can be personal computer, server or network Equipment etc.) perform all or part of of method described in each embodiment of the present invention.And aforesaid storage medium bag Include: various Jie that can store program code such as movable storage device, ROM, RAM, magnetic disc or CD Matter.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited to This, any those familiar with the art, in the technical scope that the invention discloses, can readily occur in Change or replacement, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should It is as the criterion with described scope of the claims.

Claims (10)

1. an information processing method, for processing the authentication of the operation requests for electronic equipment, institute The method of stating includes:
Obtain initial identity information;
Via identity information initial described in the first control unit pretreatment to produce identity data to be confirmed;
Via the more described identity data to be confirmed of secure processing units and described preset data template, generate ratio Relatively result;
Receive described comparative result via the second control unit, and judge whether according to this to respond described operation requests.
Method the most according to claim 1, described method also includes:
Described identity data to be confirmed is transferred to institute by safe encryption hardware interface by described first control unit State secure processing units.
Method the most according to claim 1, described via the more described body to be confirmed of secure processing units Number evidence and described preset data template, generate comparative result, including:
Relatively described identity data to be confirmed and described preset data template, generate described identity data to be confirmed Whether it is believable authentication result.
Method the most according to claim 3, described via the second control unit described comparative result of reception, And judge whether according to this to respond described operation requests, including:
When described comparative result is described believable authentication result, it is judged that for the operation of electronic equipment Request is initiated by user trusty, responds described operation requests, opens and has with user's identity The authority closed processes.
Method the most according to claim 3, described via the second control unit described comparative result of reception, And judge whether according to this to respond described operation requests, including:
When described comparative result is the authentication result of untrusted, it is judged that the operation for electronic equipment please Asking is not to be initiated by user trusty, and refusal responds described operation requests, and refusal is opened and user The authority process that my identity is relevant.
6. an electronic equipment, for processing the authentication of the operation requests for electronic equipment, described electricity Subset includes:
Acquiring unit, is used for obtaining initial identity information;
First control unit, for identity information initial described in pretreatment to produce identity data to be confirmed;
Secure processing units, for relatively described identity data to be confirmed and described preset data template, generates Comparative result;
Second control unit, is used for receiving described comparative result, and judges whether that responding described operation asks according to this Ask.
Electronic equipment the most according to claim 6, described first control unit, it is further used for passing through Described identity data to be confirmed is transferred to described secure processing units by safe encryption hardware interface.
Electronic equipment the most according to claim 6, described secure processing units, it is further used for comparing Described identity data to be confirmed and described preset data template, generate whether described identity data to be confirmed is can The authentication result of letter.
Electronic equipment the most according to claim 8, described second control unit, it is further used for described When comparative result is described believable authentication result, it is judged that for the operation requests of electronic equipment by can The user trusted is initiated, and responds described operation requests, opens the authority relevant with user's identity Process.
Electronic equipment the most according to claim 8, described second control unit, it is further used for institute When stating the authentication result that comparative result is untrusted, it is judged that the operation requests for electronic equipment is not Being initiated by user trusty, refusal responds described operation requests, and refusal is opened and this person of user The authority that part is relevant processes.
CN201510284827.4A 2015-05-28 2015-05-28 Information processing method and electronic equipment Active CN106295285B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510284827.4A CN106295285B (en) 2015-05-28 2015-05-28 Information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510284827.4A CN106295285B (en) 2015-05-28 2015-05-28 Information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN106295285A true CN106295285A (en) 2017-01-04
CN106295285B CN106295285B (en) 2020-02-21

Family

ID=57635695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510284827.4A Active CN106295285B (en) 2015-05-28 2015-05-28 Information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN106295285B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110651268A (en) * 2017-05-23 2020-01-03 指纹卡有限公司 Method and electronic device for authenticating user

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713101A (en) * 2005-07-12 2005-12-28 中国长城计算机深圳股份有限公司 Computer power-on identity authentication system and authentication method
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Fingerprint biometric identification engine system and identification method based on trusted platform module
CN103617384A (en) * 2013-11-27 2014-03-05 广州御银科技股份有限公司 Method and system for verifying starting permissions of bill sorting machine

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713101A (en) * 2005-07-12 2005-12-28 中国长城计算机深圳股份有限公司 Computer power-on identity authentication system and authentication method
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Fingerprint biometric identification engine system and identification method based on trusted platform module
CN103617384A (en) * 2013-11-27 2014-03-05 广州御银科技股份有限公司 Method and system for verifying starting permissions of bill sorting machine

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110651268A (en) * 2017-05-23 2020-01-03 指纹卡有限公司 Method and electronic device for authenticating user
CN110651268B (en) * 2017-05-23 2023-10-17 指纹卡安娜卡敦知识产权有限公司 Method for authenticating user and electronic equipment

Also Published As

Publication number Publication date
CN106295285B (en) 2020-02-21

Similar Documents

Publication Publication Date Title
CN105429761B (en) A kind of key generation method and device
CN107332659B (en) Identity authentication method, storage medium and system based on biological characteristics
EP4022472B1 (en) User authentication framework
EP3966736B1 (en) Method and system to prevent identity theft for fingerprint recognition enabled touch screen devices
Yusop et al. Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity
Lovisotto et al. Mobile biometrics in financial services: A five factor framework
KR101977897B1 (en) User Authentication System Using Mixed Reality, Virtual Reality, Augmented Reality
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
CN105868610A (en) Method and system for realizing user authentication through biological characteristic information
CN107517217A (en) A kind of multiple-factor wireless key fill system based on fingerprint recognition
CN107395369A (en) Towards mobile Internet from the authentication method of carrying device, access method and system
Aramide AI-Driven Identity Verification and Authentication in Networks: Enhancing Accuracy, Speed, and Security through Biometrics and Behavioral Analytics
Kwon et al. CCTV-based multi-factor authentication system.
Ju et al. A study on user authentication methodology using numeric password and fingerprint biometric information
CN105208045B (en) A kind of auth method, equipment and system
Malik Biometric Authentication-Risks and advancements in biometric security systems
CN110826038B (en) Data encryption and decryption method and device
CN105516182B (en) A kind of mutual authentication method and its system between smart card and reader
CN104462926A (en) Intelligent card identity recognition method and system
CN106295285A (en) A kind of information processing method and electronic equipment
Kannavara et al. Topics in biometric human-machine interaction security
Conti et al. An embedded biometric sensor for ubiquitous authentication
CN109450878A (en) Biological feather recognition method, device and system
Moepi et al. Implementation of an enhanced multi-factor authentication scheme with a track and trace capability for online banking platforms

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant