CN106295285B - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN106295285B
CN106295285B CN201510284827.4A CN201510284827A CN106295285B CN 106295285 B CN106295285 B CN 106295285B CN 201510284827 A CN201510284827 A CN 201510284827A CN 106295285 B CN106295285 B CN 106295285B
Authority
CN
China
Prior art keywords
identity
control unit
operation request
comparison result
confirmed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510284827.4A
Other languages
Chinese (zh)
Other versions
CN106295285A (en
Inventor
高营
程孝仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510284827.4A priority Critical patent/CN106295285B/en
Publication of CN106295285A publication Critical patent/CN106295285A/en
Application granted granted Critical
Publication of CN106295285B publication Critical patent/CN106295285B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention discloses an information processing method and electronic equipment, wherein the information processing method is used for processing identity verification aiming at an operation request of the electronic equipment, and comprises the following steps: acquiring initial identity information; preprocessing the initial identity information via a first control unit to generate identity data to be confirmed; comparing the identity data to be confirmed with the preset data template through a safety processing unit to generate a comparison result; and receiving the comparison result through a second control unit, and judging whether to respond to the operation request or not according to the comparison result.

Description

Information processing method and electronic equipment
Technical Field
The present invention relates to communications technologies, and in particular, to an information processing method and an electronic device.
Background
In the process of implementing the technical solution of the embodiment of the present application, the inventor of the present application finds at least the following technical problems in the related art:
biometric technology is widely integrated on mobile devices and is popular with users. Biometric technology can be used for intelligent unlocking, intelligent power-on, and other authentication related to user privacy and security. One type of biometric technology is the fingerprint identification scheme (fingerprint), which is a problem with existing fingerprint technologies: 1) the finger print realized by using the software technology is very easy to be maliciously cracked by a disguised user, so that the privacy and the safety of the user cannot be protected; 2) the finger print implemented using software technology requires the introduction of additional separate hardware to implement, increasing cost.
However, in the related art, there is no effective solution to this problem.
Disclosure of Invention
In view of the above, embodiments of the present invention provide an information processing method and an electronic device, which at least solve the problems in the prior art.
The technical scheme of the embodiment of the invention is realized as follows:
an information processing method according to an embodiment of the present invention is a method for processing authentication for an operation request of an electronic device, including:
acquiring initial identity information;
preprocessing the initial identity information via a first control unit to generate identity data to be confirmed;
comparing the identity data to be confirmed with the preset data template through a safety processing unit to generate a comparison result;
and receiving the comparison result through a second control unit, and judging whether to respond to the operation request or not according to the comparison result.
In the above scheme, the method further comprises:
and the first control unit transmits the identity data to be confirmed to the security processing unit through a security encryption hardware interface.
In the foregoing solution, the comparing, by the security processing unit, the to-be-confirmed identity data with the preset data template to generate a comparison result includes:
and comparing the identity data to be confirmed with the preset data template to generate an identity verification result whether the identity data to be confirmed is credible.
In the above solution, the receiving the comparison result via the second control unit and accordingly determining whether to respond to the operation request includes:
and when the comparison result is the credible identity verification result, judging that the operation request aiming at the electronic equipment is initiated by the credible user, responding to the operation request, and starting authority processing related to the identity of the user.
In the above solution, the receiving the comparison result via the second control unit and accordingly determining whether to respond to the operation request includes:
and when the comparison result is an untrusted identity authentication result, judging that the operation request aiming at the electronic equipment is not initiated by a trusted user, refusing to respond to the operation request, and refusing to start authority processing related to the identity of the user.
An electronic device according to an embodiment of the present invention is configured to process authentication for an operation request of the electronic device, and the electronic device includes:
an acquisition unit, configured to acquire initial identity information;
the first control unit is used for preprocessing the initial identity information to generate identity data to be confirmed;
the safety processing unit is used for comparing the identity data to be confirmed with the preset data template to generate a comparison result;
and the second control unit is used for receiving the comparison result and judging whether to respond to the operation request or not according to the comparison result.
In the above scheme, the first control unit is further configured to transmit the identity data to be confirmed to the security processing unit through a security encryption hardware interface.
In the above scheme, the security processing unit is further configured to compare the to-be-confirmed identity data with the preset data template, and generate an identity verification result whether the to-be-confirmed identity data is authentic.
In the foregoing solution, the second control unit is further configured to, when the comparison result is the authentic authentication result, determine that the operation request for the electronic device is initiated by the authentic user, respond to the operation request, and start permission processing related to the identity of the user.
In the foregoing solution, the second control unit is further configured to, when the comparison result is an untrusted authentication result, determine that the operation request for the electronic device is not initiated by the trusted user, reject to respond to the operation request, and reject to start permission processing related to the identity of the trusted user.
The information processing method of the embodiment of the invention is used for processing the identity verification of the operation request aiming at the electronic equipment, and the method comprises the following steps: acquiring initial identity information; preprocessing the initial identity information via a first control unit to generate identity data to be confirmed; comparing the identity data to be confirmed with the preset data template through a safety processing unit to generate a comparison result; and receiving the comparison result through a second control unit, and judging whether to respond to the operation request or not according to the comparison result.
By adopting the embodiment of the invention, the identity data to be confirmed is obtained by preprocessing the initial identity information through the first control unit, the identity data to be confirmed is compared with the preset data template through the safety processing unit to generate a comparison result, and finally, whether the operation request aiming at the electronic equipment is responded is judged by the second control unit according to the comparison result, so that the identity verification of the operation request initiator is completed. By adopting the embodiment of the invention, on the one hand: the security level is high, and the information is not easy to be maliciously cracked by a disguised user, so that the privacy and the security of the user can be protected; on the other hand, additional independent hardware is not required to be introduced for implementation, so that the cost is reduced.
Drawings
FIG. 1 is a schematic flow chart of a first implementation of the method according to the first embodiment of the present invention;
FIG. 2 is a schematic flow chart of an implementation of the embodiment of the method of the present invention;
FIG. 3 is a schematic diagram of a component structure of an embodiment of an electronic device according to the invention;
FIG. 4 is a schematic diagram of a component structure of an embodiment of an electronic device according to the invention;
FIG. 5 is a diagram illustrating an application scenario in which embodiments of the present invention are applied;
fig. 6 is a schematic diagram of an authentication process based on the hardware architecture of the system shown in fig. 5.
Detailed Description
The following describes the embodiments in further detail with reference to the accompanying drawings.
The first embodiment of the method comprises the following steps:
an information processing method according to an embodiment of the present invention is configured to process authentication for an operation request of an electronic device, and as shown in fig. 1, the method includes:
step 101, obtaining initial identity information.
Step 102, preprocessing the initial identity information by a first control unit to generate identity data to be confirmed.
And 103, comparing the identity data to be confirmed with the preset data template through a safety processing unit to generate a comparison result.
And 104, receiving the comparison result through the second control unit, and judging whether to respond to the operation request according to the comparison result.
By adopting the embodiment of the invention, the identity data to be confirmed is obtained by preprocessing the initial identity information through the first control unit, the identity data to be confirmed is compared with the preset data template through the safety processing unit to generate a comparison result, and finally, whether the operation request aiming at the electronic equipment is responded is judged by the second control unit according to the comparison result, so that the identity verification of the operation request initiator is completed. By adopting the embodiment of the invention, on the one hand: the security level is high, and the information is not easy to be maliciously cracked by a disguised user, so that the privacy and the security of the user can be protected; on the other hand, additional independent hardware is not required to be introduced for implementation, so that the cost is reduced.
Here, when step 101 is executed by a Fingerprint sensor (Fingerprint sensor), the first control unit is EC, the security processing unit is Secure element, and the second control unit is CPU, a specific example is: fingerprint information is acquired by the Fingerprint sensor, and is preprocessed by the EC to obtain identity data to be confirmed; comparing the identity data to be confirmed with the preset data template through a Secure element to generate a comparison result; and receiving the comparison result through the CPU, and judging whether to respond to the operation request according to the comparison result.
The second method embodiment:
an information processing method according to an embodiment of the present invention is configured to process authentication for an operation request of an electronic device, and as shown in fig. 2, the method includes:
step 201, obtaining initial identity information.
Step 202, preprocessing the initial identity information via a first control unit to generate identity data to be confirmed.
And 203, the first control unit transmits the identity data to be confirmed to the security processing unit through a security encryption hardware interface.
And step 204, comparing the identity data to be confirmed with the preset data template through a security processing unit to generate a comparison result.
Step 205, receiving the comparison result through the second control unit, and determining whether to respond to the operation request.
The third method embodiment:
an information processing method according to an embodiment of the present invention is configured to process authentication for an operation request of an electronic device, and as shown in fig. 3, the method includes:
step 301, obtaining initial identity information.
Step 302, pre-processing the initial identity information via a first control unit to generate identity data to be confirmed.
And step 303, the first control unit transmits the identity data to be confirmed to the security processing unit through a security encryption hardware interface.
Step 304, the first control unit compares the identity data to be confirmed with the preset data template to generate an identity verification result whether the identity data to be confirmed is authentic, if so, step 305 is executed, otherwise, step 306 is executed.
And 305, when the comparison result is the credible identity verification result, judging that the operation request for the electronic equipment is initiated by the credible user, responding to the operation request, and starting authority processing related to the identity of the user.
And step 306, when the comparison result is an untrusted identity authentication result, determining that the operation request for the electronic device is not initiated by the trusted user, refusing to respond to the operation request, and refusing to start permission processing related to the identity of the user.
Here, it should be noted that: the following description of the electronic device items is similar to the description of the method, and the description of the beneficial effects of the method is omitted for brevity. For technical details not disclosed in the embodiments of the electronic device of the present invention, refer to the description of the embodiments of the method of the present invention.
The first embodiment of the electronic device:
an electronic device according to an embodiment of the present invention is configured to process authentication for an operation request of the electronic device, and as shown in fig. 4, the electronic device includes:
an obtaining unit 11, configured to obtain initial identity information; a first control unit 12, configured to pre-process the initial identity information to generate identity data to be confirmed; the security processing unit 13 is configured to compare the identity data to be confirmed with the preset data template, and generate a comparison result; the second control unit 14 is configured to receive the comparison result and accordingly determine whether to respond to the operation request.
Second embodiment of the electronic device:
an electronic device according to an embodiment of the present invention is configured to process authentication for an operation request of the electronic device, and as shown in fig. 4, the electronic device includes:
an obtaining unit 11, configured to obtain initial identity information; the first control unit 12 is configured to preprocess the initial identity information to generate identity data to be confirmed, and transmit the identity data to be confirmed to the security processing unit 13 through a security encryption hardware interface; the security processing unit 13 is configured to compare the identity data to be confirmed with the preset data template, and generate a comparison result; the second control unit 14 is configured to receive the comparison result and accordingly determine whether to respond to the operation request.
Electronic equipment embodiment three:
an electronic device according to an embodiment of the present invention is configured to process authentication for an operation request of the electronic device, and as shown in fig. 4, the electronic device includes:
an obtaining unit 11, configured to obtain initial identity information; the first control unit 12 is configured to preprocess the initial identity information to generate identity data to be confirmed, and transmit the identity data to be confirmed to the security processing unit 13 through a security encryption hardware interface; the security processing unit 13 is configured to compare the to-be-confirmed identity data with the preset data template, and generate an identity verification result whether the to-be-confirmed identity data is authentic; the second control unit 14 is configured to, when the comparison result is the authentic authentication result, determine that the operation request for the electronic device is initiated by the trusted user, respond to the operation request, and start permission processing related to the identity of the user; or when the comparison result is an untrusted identity authentication result, judging that the operation request for the electronic equipment is not initiated by the trusted user, refusing to respond to the operation request, and refusing to start the authority processing related to the identity of the trusted user.
The embodiment of the invention is explained by taking a practical application scene as an example as follows:
the application scenario is a finger print technology, and identity is authenticated based on a fingerprint pressed by using textures of a finger and a thumb front end. Fingerprints are a reliable method of identifying identity because the texture arrangement on each finger of each individual varies and does not change with development or age. Fingerprints are used to reveal the true identity of a person despite personal repudiation, the use of pseudonyms, or changes in appearance due to age disorders, plastic surgery, or accidents. The method of using fingerprints as an identity authentication method is called fingerprint identification method, and is an indispensable auxiliary means in modern law enforcement.
With the popularization of intelligent terminals, such as smart phones, the finger print technology is widely integrated on mobile devices as biometric identification, and is popular with users. But the security problem of the finger print technology also becomes the most concern at present. For example, one existing solution is: the fingerprint is directly connected with the CPU, and the defects of the scheme are as follows: software solutions suffer from malicious software stealing user information; another existing solution is: the finger print is directly connected with the safety controller, and the defects of the scheme are as follows: in the hardware solution, the safety controller needs a certain processing and computing capability, the price is relatively high, cost up to 1$, and the method of additionally adding hardware can increase the manufacturing cost.
The application scenario adopts the embodiment of the invention, is a reliable fingerprint identification (fingerprint) security system design scheme, is a security design scheme integrating fingerprints on a notebook, and certainly can also be used on other intelligent terminals, such as smart phones.
Taking the security design scheme of integrating the finger print on the notebook as an example, only the existing controller of the notebook needs to be utilized, no extra hardware resource needs to be added, no extra manufacturing cost is increased, a reliable security system can be provided for users, and the product competitiveness is improved.
The system hardware architecture adopted by the scheme is shown in fig. 5, and comprises: fingerprint Sensor21, for obtaining user initial Fingerprint information, such as image information; the EC22 is used for acquiring a CPU control command, reading the image information of the Fingerprint Sensor, preprocessing the image information to obtain image data, transmitting the image data to the SE, and outputting the SE result to the CPU; the SE23 is provided with a hardware encryption security processing module and is used for storing a user fingerprint template, receiving image data transmitted by the EC for comparison, outputting a credible result to the EC, and then outputting the credible result to the CPU; the CPU24, serving as a notebook processor, is configured to process an application program, perform authentication on a user corresponding to a fingerprint with respect to a trusted result obtained from the EC to determine whether to respond to an operation request of the user for the electronic device, for example, if the operation request is a user power-on request, determine, according to the trusted result, that the operation request for the electronic device is initiated by a trusted user, respond to the operation request, and start permission processing related to an identity of the user, specifically, start the notebook, otherwise, determine, when the operation request is an untrusted authentication result, that the operation request for the electronic device is not initiated by the trusted user, refuse to respond to the operation request, and refuse to start permission processing related to the identity of the user.
As can be seen from fig. 5, the key points are: the added system controller EC is used as a communication bridge of Fingerprint, a communication link between CPU-EC-SE-Fingerprint Sensor is designed to ensure that the safety information of a user cannot be stolen by malicious software, a reliable safety system is provided, and hardware cost is avoided, namely: both the Fingerprint Sensor and a security controller (SE, Secure Element) with an encryption unit are connected to the EC, the CPU and the Fingerprint Sensor are not directly connected, and the CPU and the SE are not directly connected, and both need to be relayed and processed through the EC. It can be seen that: the monitoring system is realized by software and hardware, a system EC controller is utilized, after the EC receives a CPU control command, the EC reads the image information of the Fingerprint Sensor, processes the image information to generate image data, transmits the image data to the SE module, the SE module judges whether the image is a credible image or not through a comparison template, transmits a result to the EC, and after the EC receives the image, the EC outputs the result to the CPU to complete user identification. In the whole identification process, the CPU cannot directly acquire image information and a comparison template from the Fingerprint Sensor and the SE module.
Based on the system hardware architecture shown in fig. 5, the authentication process executed is shown in fig. 6, and includes:
step 501, when a user calls a Fingerprint function through software, image information is obtained through Fingerprint Sensor scanning.
Step 502, the CPU informs the EC to start a fingerprint function, and reads the image information of the fingerprint through the EC.
Step 503, EC processes the read image information to generate image data.
And step 504, the EC transmits the processed image data to the SE through a secure encryption hardware interface, the SE receives the image data transmitted by the EC, and the image data is matched with a stored image template to determine whether the image is a credible image or not, so that a credible result is obtained.
And 505, the SE feeds back the credible result to the EC, the EC transmits the credible result to the CPU to perform final judgment so as to determine whether to respond to the operation request, and finally, the response result is returned to the User APP of the User.
The application scene adopts the embodiment of the invention, and the beneficial effects after the scheme is adopted are as follows: 1) the image information obtained by the finger print is not directly obtained by the CPU, so that other malicious software is guaranteed to steal the user information, and a reliable safety system is provided; 2) the scheme is a hardware encryption scheme, and the safety factor is improved; 3) the scheme utilizes the existing EC resources as communication channels, does not need to add extra hardware resources and does not have cost up; 4) the scheme is completed by the bottom controller, so that CPU resources are not occupied, and the power consumption of the system is not increased; 5) the user requirements are intelligently identified, and the user experience is improved.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. An information processing method for processing authentication for an operation request of an electronic device, the method comprising:
acquiring initial identity information;
preprocessing the initial identity information via a first control unit to generate identity data to be confirmed;
comparing the identity data to be confirmed with a preset data template through a safety processing unit to generate a comparison result;
receiving the comparison result via the first control unit and passing the comparison result to a second control unit;
receiving the comparison result from the first control unit via the second control unit, and accordingly determining whether to respond to the operation request;
the first control unit is an embedded controller EC, the second control unit is a central processing unit CPU, and the safety processing unit is a safety element SE.
2. The method of claim 1, further comprising:
and the first control unit transmits the identity data to be confirmed to the security processing unit through a security encryption hardware interface.
3. The method of claim 1, the comparing, via a secure processing unit, the identity data to be validated with the preset data template, generating a comparison result, comprising:
and comparing the identity data to be confirmed with the preset data template to generate an identity verification result whether the identity data to be confirmed is credible.
4. The method of claim 3, said receiving the comparison result via the second control unit and determining whether to respond to the operation request accordingly, comprising:
and when the comparison result is the credible identity verification result, judging that the operation request aiming at the electronic equipment is initiated by the credible user, responding to the operation request, and starting authority processing related to the identity of the user.
5. The method of claim 3, said receiving the comparison result via the second control unit and determining whether to respond to the operation request accordingly, comprising:
and when the comparison result is an untrusted identity authentication result, judging that the operation request aiming at the electronic equipment is not initiated by a trusted user, refusing to respond to the operation request, and refusing to start authority processing related to the identity of the user.
6. An electronic device for handling authentication of an operation request for the electronic device, the electronic device comprising:
an acquisition unit, configured to acquire initial identity information;
the safety processing unit is used for comparing the identity data to be confirmed with a preset data template to generate a comparison result;
the first control unit is used for preprocessing the initial identity information to generate the identity data to be confirmed, transmitting the identity data to be confirmed to the security processing unit and receiving the comparison result from the security processing unit;
the second control unit is used for receiving the comparison result from the first control unit and judging whether to respond to the operation request or not according to the comparison result;
the first control unit is an embedded controller EC, the second control unit is a central processing unit CPU, and the safety processing unit is a safety element SE.
7. The electronic device of claim 6, the first control unit further configured to transmit the identity data to be confirmed to the secure processing unit via a secure cryptographic hardware interface.
8. The electronic device of claim 6, wherein the security processing unit is further configured to compare the to-be-confirmed identity data with the preset data template, and generate an authentication result indicating whether the to-be-confirmed identity data is authentic.
9. The electronic device of claim 8, wherein the second control unit is further configured to determine that an operation request for the electronic device is initiated by a trusted user when the comparison result is the trusted authentication result, and start, in response to the operation request, authorization processing related to identity of the trusted user.
10. The electronic device of claim 8, wherein the second control unit is further configured to, when the comparison result is an untrusted authentication result, determine that the operation request for the electronic device is not initiated by the trusted user himself, reject to respond to the operation request, and reject to start the authorization process related to the identity of the trusted user himself.
CN201510284827.4A 2015-05-28 2015-05-28 Information processing method and electronic equipment Active CN106295285B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510284827.4A CN106295285B (en) 2015-05-28 2015-05-28 Information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510284827.4A CN106295285B (en) 2015-05-28 2015-05-28 Information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN106295285A CN106295285A (en) 2017-01-04
CN106295285B true CN106295285B (en) 2020-02-21

Family

ID=57635695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510284827.4A Active CN106295285B (en) 2015-05-28 2015-05-28 Information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN106295285B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110651268B (en) * 2017-05-23 2023-10-17 指纹卡安娜卡敦知识产权有限公司 Method for authenticating user and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713101A (en) * 2005-07-12 2005-12-28 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN103617384A (en) * 2013-11-27 2014-03-05 广州御银科技股份有限公司 Method and system for verifying starting permissions of bill sorting machine

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713101A (en) * 2005-07-12 2005-12-28 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN103617384A (en) * 2013-11-27 2014-03-05 广州御银科技股份有限公司 Method and system for verifying starting permissions of bill sorting machine

Also Published As

Publication number Publication date
CN106295285A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
US20230325538A1 (en) Method and apparatus for processing biometric information in electronic device
US10063541B2 (en) User authentication method and electronic device performing user authentication
EP2973164B1 (en) Technologies for secure storage and use of biometric authentication information
US8074880B2 (en) Method, system and mobile device employing enhanced fingerprint authentication
US11212283B2 (en) Method for authentication and authorization and authentication server using the same for providing user management mechanism required by multiple applications
US11516212B2 (en) Multi-functional authentication apparatus and operating method for the same
US20130326613A1 (en) Dynamic control of device unlocking security level
US10091196B2 (en) Method and apparatus for authenticating user by using information processing device
KR20130113486A (en) User identity attestation in mobile commerce
CN109145558B (en) Unlocking control method and electronic device
US20100133342A1 (en) Secure use of externally stored data
CN105608357A (en) Fingerprint verification method, fingerprint verification device and terminal
TWI534711B (en) Smart card and access method thereof
TW202040385A (en) System for using device identification to identify via telecommunication server and method thereof
US20200184056A1 (en) Method and electronic device for authenticating a user
CN104937602B (en) Privacy protection method and electronic equipment
CN106295285B (en) Information processing method and electronic equipment
KR102010764B1 (en) Computer security system and method using authentication function in smart phone
EP3811254A1 (en) Method and electronic device for authenticating a user
EP3564837A1 (en) System, method and computer programs for user authentication and/or authorization
CN110912704B (en) Certificate loading method and related product
CN109583168B (en) Unlocking control method and electronic device
JP7297105B2 (en) COMMUNICATION DEVICE AND METHOD USING SAME COMMUNICATION DEVICE
CN109543380B (en) Unlocking control method and electronic device
KR102252784B1 (en) Method for user authentication, method for generating user specific authentication information and system performing the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant